Skip to content

Latest commit

 

History

History
42 lines (22 loc) · 1.4 KB

File metadata and controls

42 lines (22 loc) · 1.4 KB

T1078.003 - Local Accounts

Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.

Local Accounts may also be abused to elevate privileges and harvest credentials through OS Credential Dumping. Password reuse may allow the abuse of local accounts across a set of machines on a network for the purposes of Privilege Escalation and Lateral Movement.

Atomic Tests


Atomic Test #1 - Create local account with admin priviliges

After execution the new account will be active and added to the Administrators group

Supported Platforms: Windows

Attack Commands: Run with command_prompt! Elevation Required (e.g. root or admin)

net user art-test /add
net user art-test Password123!
net localgroup administrators art-test /add

Cleanup Commands:

net localgroup administrators art-test /delete >nul 2>&1
net user art-test /delete >nul 2>&1