Skip to content

Latest commit

 

History

History
232 lines (126 loc) · 5.79 KB

T1136.001.md

File metadata and controls

232 lines (126 loc) · 5.79 KB

T1136.001 - Local Account

Adversaries may create a local account to maintain access to victim systems. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service. With a sufficient level of access, the net user /add command can be used to create a local account.

Such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.

Atomic Tests


Atomic Test #1 - Create a user account on a Linux system

Create a user via useradd

Supported Platforms: Linux

Inputs:

Name Description Type Default Value
username Username of the user to create String evil_user

Attack Commands: Run with bash! Elevation Required (e.g. root or admin)

useradd -M -N -r -s /bin/bash -c evil_account #{username}

Cleanup Commands:

userdel #{username}


Atomic Test #2 - Create a user account on a MacOS system

Creates a user on a MacOS system with dscl

Supported Platforms: macOS

Inputs:

Name Description Type Default Value
username Username of the user to create String evil_user
realname 'realname' to record when creating the user String Evil Account

Attack Commands: Run with bash! Elevation Required (e.g. root or admin)

dscl . -create /Users/#{username}
dscl . -create /Users/#{username} UserShell /bin/zsh
dscl . -create /Users/#{username} RealName "#{realname}"
dscl . -create /Users/#{username} UniqueID "1010"
dscl . -create /Users/#{username} PrimaryGroupID 80
dscl . -create /Users/#{username} NFSHomeDirectory /Users/#{username}

Cleanup Commands:

dscl . -delete /Users/#{username}


Atomic Test #3 - Create a new user in a command prompt

Creates a new user in a command prompt. Upon execution, "The command completed successfully." will be displayed. To verify the new account, run "net user" in powershell or CMD and observe that there is a new user named "T1136.001_CMD"

Supported Platforms: Windows

Inputs:

Name Description Type Default Value
username Username of the user to create String T1136.001_CMD
password Password of the user to create String T1136.001_CMD!

Attack Commands: Run with command_prompt! Elevation Required (e.g. root or admin)

net user /add "#{username}" "#{password}"

Cleanup Commands:

net user /del "#{username}" >nul 2>&1


Atomic Test #4 - Create a new user in PowerShell

Creates a new user in PowerShell. Upon execution, details about the new account will be displayed in the powershell session. To verify the new account, run "net user" in powershell or CMD and observe that there is a new user named "T1136.001_PowerShell"

Supported Platforms: Windows

Inputs:

Name Description Type Default Value
username Username of the user to create String T1136.001_PowerShell

Attack Commands: Run with powershell! Elevation Required (e.g. root or admin)

New-LocalUser -Name "#{username}" -NoPassword

Cleanup Commands:

Remove-LocalUser -Name "#{username}" -ErrorAction Ignore


Atomic Test #5 - Create a new user in Linux with root UID and GID.

Creates a new user in Linux and adds the user to the root group. This technique was used by adversaries during the Butter attack campaign.

Supported Platforms: Linux

Inputs:

Name Description Type Default Value
username Username of the user to create String butter
password Password of the user to create String BetterWithButter

Attack Commands: Run with bash! Elevation Required (e.g. root or admin)

useradd -g 0 -M -d /root -s /bin/bash #{username}
if [ $(cat /etc/os-release | grep -i 'Name="ubuntu"') ]; then echo "#{username}:#{password}" | sudo chpasswd; else echo "#{password}" | passwd --stdin #{username}; fi;

Cleanup Commands:

userdel #{username}


Atomic Test #6 - Create a new Windows admin user

Creates a new admin user in a command prompt.

Supported Platforms: Windows

Inputs:

Name Description Type Default Value
username Username of the user to create String T1136.001_Admin
password Password of the user to create String T1136_pass

Attack Commands: Run with command_prompt! Elevation Required (e.g. root or admin)

net user /add "#{username}" "#{password}"
net localgroup administrators "#{username}" /add

Cleanup Commands:

net user /del "#{username}" >nul 2>&1