sigma |
win_lolbas_execution_of_nltest.yml |
title: Correct Execution of Nltest.exe |
DRL 1.0 |
sigma |
win_lolbas_execution_of_nltest.yml |
description: The attacker might use LOLBAS nltest.exe for discovery of domain controllers, domain trusts, parent domain and the current user permissions. |
DRL 1.0 |
sigma |
win_lolbas_execution_of_nltest.yml |
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/nltest.htm |
DRL 1.0 |
sigma |
win_lolbas_execution_of_nltest.yml |
- attack.t1482 # enumerate trusted domains by using commands such as nltest /domain_trusts |
DRL 1.0 |
sigma |
win_lolbas_execution_of_nltest.yml |
ProcessName\|endswith: nltest.exe |
DRL 1.0 |
sigma |
proc_creation_win_malware_trickbot_recon_activity.yml |
- '\nltest.exe' |
DRL 1.0 |
sigma |
proc_creation_win_nltest_recon.yml |
title: Recon Activity with NLTEST |
DRL 1.0 |
sigma |
proc_creation_win_nltest_recon.yml |
description: Detects nltest commands that can be used for information discovery |
DRL 1.0 |
sigma |
proc_creation_win_nltest_recon.yml |
Image\|endswith: '\nltest.exe' |
DRL 1.0 |
sigma |
proc_creation_win_susp_spoolsv_child_processes.yml |
- \nltest.exe |
DRL 1.0 |
sigma |
proc_creation_win_trust_discovery.yml |
description: Identifies execution of nltest.exe and dsquery.exe for domain trust discovery. This technique is used by attackers to enumerate Active Directory trusts. |
DRL 1.0 |
sigma |
proc_creation_win_trust_discovery.yml |
Image\|endswith: '\nltest.exe' |
DRL 1.0 |
LOLBAS |
Nltest.yml |
Name: Nltest.exe |
|
LOLBAS |
Nltest.yml |
- Command: nltest.exe /SERVER:192.168.1.10 /QUERY |
|
LOLBAS |
Nltest.yml |
- c:\windows\system32\nltest.exe |
|
LOLBAS |
Nltest.yml |
- https://ss64.com/nt/nltest.html |
|
atomic-red-team |
index.md |
- Atomic Test #2: Windows - Discover domain trusts with nltest [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
index.md |
- Atomic Test #3: Remote System Discovery - nltest [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-index.md |
- Atomic Test #2: Windows - Discover domain trusts with nltest [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-index.md |
- Atomic Test #3: Remote System Discovery - nltest [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1016.md |
Upon successful execution, cmd.exe will spawn ipconfig /all , net config workstation , net view /all /domain , nltest /domain_trusts . Output will be via stdout. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1016.md |
nltest /domain_trusts |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1018.md |
- Atomic Test #3 - Remote System Discovery - nltest |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1018.md |
## Atomic Test #3 - Remote System Discovery - nltest |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1018.md |
Upon successful execution, cmd.exe will execute nltest.exe against a target domain to retrieve a list of domain controllers. Output will be via stdout. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1018.md |
nltest.exe /dclist:#{target_domain} |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
<blockquote>Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in Windows multi-domain/forest environments. Domain trusts provide a mechanism for a domain to allow access to resources based on the authentication procedures of another domain.(Citation: Microsoft Trusts) Domain trusts allow the users of the trusted domain to access resources in the trusting domain. The information discovered may help the adversary conduct SID-History Injection, Pass the Ticket, and Kerberoasting.(Citation: AdSecurity Forging Trust Tickets)(Citation: Harmj0y Domain Trusts) Domain trusts can be enumerated using the DSEnumerateDomainTrusts() Win32 API call, .NET methods, and LDAP.(Citation: Harmj0y Domain Trusts) The Windows utility Nltest is known to be used by adversaries to enumerate domain trusts.(Citation: Microsoft Operation Wilysupply)</blockquote> |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
- Atomic Test #2 - Windows - Discover domain trusts with nltest |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
## Atomic Test #2 - Windows - Discover domain trusts with nltest |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
Uses the nltest command to discover domain trusts. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
Requires the installation of nltest via Windows RSAT or the Windows Server AD DS role. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
nltest /domain_trusts |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
##### Description: nltest.exe from RSAT must be present on disk |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1482.md |
WHERE nltest.exe >NUL 2>&1 |
MIT License. © 2018 Red Canary |
stockpile |
26c8b8b5-7b5b-4de1-a128-7d37fb14f517.yml |
nltest /dsgetdc:%USERDOMAIN% |
Apache-2.0 |
stockpile |
26c8b8b5-7b5b-4de1-a128-7d37fb14f517.yml |
nltest /dsgetdc:$env:USERDOMAIN |
Apache-2.0 |