test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /tool /tool--4b57c098-f043-4da2-83ef-7588a6d426bc.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
2.25 kB
{
"type": "bundle",
"id": "bundle--01108eb1-ac00-4f55-b94a-f0c876521716",
"spec_version": "2.0",
"objects": [
{
"labels": [
"tool"
],
"x_mitre_platforms": [
"Windows",
"Linux",
"macOS"
],
"x_mitre_domains": [
"enterprise-attack"
],
"x_mitre_aliases": [
"PoshC2"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"type": "tool",
"id": "tool--4b57c098-f043-4da2-83ef-7588a6d426bc",
"created": "2019-04-23T12:31:58.125Z",
"x_mitre_version": "1.3",
"external_references": [
{
"source_name": "mitre-attack",
"external_id": "S0378",
"url": "https://attack.mitre.org/software/S0378"
},
{
"source_name": "GitHub PoshC2",
"url": "https://github.com/nettitude/PoshC2_Python",
"description": "Nettitude. (2018, July 23). Python Server for PoshC2. Retrieved April 23, 2019."
}
],
"x_mitre_deprecated": false,
"revoked": false,
"description": "[PoshC2](https://attack.mitre.org/software/S0378) is an open source remote administration and post-exploitation framework that is publicly available on GitHub. The server-side components of the tool are primarily written in Python, while the implants are written in [PowerShell](https://attack.mitre.org/techniques/T1059/001). Although [PoshC2](https://attack.mitre.org/software/S0378) is primarily focused on Windows implantation, it does contain a basic Python dropper for Linux/macOS.(Citation: GitHub PoshC2)",
"modified": "2022-06-03T17:45:36.186Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"name": "PoshC2",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}