Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion content/oscar/techniques/T0112 - Compromised token.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ detections:
- D1262
- D1500

subtechniques:
subTechniques:
- T0105

references:
Expand Down
2 changes: 1 addition & 1 deletion content/oscar/techniques/T0129 - Typosquatting.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ detections:
- D1510
- D1520

subtechinques:
subTechniques:
- T0157

references:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ detections:
- D1510
- D1590

subtechinques:
subTechniques:
- T0162

references:
Expand Down
2 changes: 1 addition & 1 deletion content/oscar/techniques/T0165 - Create access token.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ mitigations:
detections:
- D1650

refrences:
references:
- https://circleci.com/blog/jan-4-2023-incident-report/

metadata:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ detections:
- D1510
- D1520

subtechinques:
subTechniques:
- T0144
- T0146

Expand Down
4 changes: 2 additions & 2 deletions content/templates/stories/AS1 - Webmin 1.900 RCE.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ attacks:
- tactic: Initial Access

- technique:
- techid: T0191
- techname: Malicious Code In Artifacts
- techniqueID: T0191
- techName: Malicious Code In Artifacts
- tactic: Impact
- comment: The attackers infected the webmin code with a backdoor that allowed remote code execution.
- technique:
Expand Down
Loading