Skip to content

Manticore-Platform/public-scenarios

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Manticore Public Threat Scenarios

Collection

Scenario Description Link
cn-001.json Native API call(s) were used to collect a screenshot. cn-001.json
cn-002.json Execute PowerShell from cmd.exe to collect and compress files of specific extensions. cn-002.json
cn-003.json Load custom PowerShell module and take screenshots. cn-003.json
cn-004.json Perform e-mail collection from custom PowerShell module. cn-004.json
cn-005.json Get contents of clipboard. cn-005.json

Credential Access

Scenario Description Link
ca-001.json Download Mimikatz Binary ca-001.json
ca-002.json Dumping credentials via wmidump (Mimikatz) cn-002.json
ca-003.json Mimikatz lsadump::sam is executed via Invoke-Mimikatz to dump hashes via process injection into LSASS. ca-003.json

Defense Evasion

Scenario Description Link
de-001.json Invoke UAC bypass sdctl de-001.json
de-002.json Timestomp kxwn.lock de-002.json
de-003.json Delete registry entries post-UAC Bypass de-003.json

Discovery

Scenario Description Link
dv-001.json Triage host for information dv-001.json
dv-002.json The net utility is executed via cmd to enumerate hosts within the domain. dv-002.json
dv-003.json Delete registry entries post-UAC Bypass dv-003.json
dv-004.json Get domain controller and curret user SID for the domain dv-004.json

Impact

Scenario Description Link
im-001.json Go Multiplatform Ransomware Emulation im-001.json
im-002.json Powershell Ransomware Emulation im-002.json

Command And Control

Scenario Description Link
cc-001.json Use Certutil.exe to download a file from a remote server cc-001.json
cc-002.json Use Bitsadmin.exe to download a file from a remote server cc-002.json

Releases

No releases published

Packages

No packages published