mitre / caldera

Automated Adversary Emulation Platform
https://caldera.mitre.org
Apache License 2.0
5.54k stars 1.06k forks source link

I want to disable the execution policy so that I can run a script using PowerShell. I #2651

Closed DillonSingh closed 1 year ago

DillonSingh commented 2 years ago

I am trying to write a blog on adversary emulation. I have chosen to emulate APT29's attacks. VMware have created a script that consists of atomic red team tests that closely resemble to TTPs of APT29. I am trying to import the script but it says the following:

image

I've set execution policy to bypass but the script is still being blocked

image

github-actions[bot] commented 2 years ago

This issue is stale because it has been open 20 days with no activity. Remove stale label or comment or this will be closed in 5 days

yee-jonathan commented 2 years ago

@DillonSingh Do you mind sharing the powershell script you're trying to run? Based on the error output, the issues you are running into are not due to script execution, but rather from error's in execution from within the script. In this case, it seems like the hypertext tags are causing the problems.

Also, this does not appear to be a CALDERA problem. You might have better luck solving your problem by notifying the script authors.

github-actions[bot] commented 1 year ago

This issue is stale because it has been open 20 days with no activity. Remove stale label or comment or this will be closed in 5 days