Skip to content

Commit

Permalink
fix some typo error
Browse files Browse the repository at this point in the history
  • Loading branch information
frack113 committed Jul 12, 2021
1 parent 99b0d32 commit af140eb
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ references:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
author: Sittikorn S, Nuttakorn T
date: 2021/07/01
tag:
tags:
- attack.privilege_escalation
- attack.t1055
logsource:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
title: Suspicious Netsh DLL Persistence
id: 56321594-9087-49d9-bf10-524fe8479452
description: Detects persitence via netsh helper
status: testing
status: test
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1128/T1128.md
tags:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
action: global
title: Abusing Windows Telemetry For Persistence
id: 4e8d5fd3-c959-441f-a941-f73d0cdcdca5
status: Experimental
status: experimental
description: Windows telemetry makes use of the binary CompatTelRunner.exe to run a variety of commands and perform the actual telemetry collections. This binary was created to be easily extensible, and to that end, it relies on the registry to instruct on which commands to run. The problem is, it will run any arbitrary command without restriction of location or type.
references:
- https://www.trustedsec.com/blog/abusing-windows-telemetry-for-persistence/
Expand Down

0 comments on commit af140eb

Please sign in to comment.