diff --git a/atomics/T1528/T1528.yaml b/atomics/T1528/T1528.yaml index 6ac24891..c3d0c5c1 100644 --- a/atomics/T1528/T1528.yaml +++ b/atomics/T1528/T1528.yaml @@ -2,6 +2,7 @@ attack_technique: T1528 display_name: Steal Application Access Token atomic_tests: - name: Azure - Dump All Azure Key Vaults with Microburst + auto_generated_guid: 1b83cddb-eaa7-45aa-98a5-85fb0a8807ea description: |- Upon successful execution of this test, the names, locations, and contents of key vaults within an Azure account will be output to a file. See - https://www.netspi.com/blog/technical/cloud-penetration-testing/a-beginners-guide-to-gathering-azure-passwords/ diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 91efd66d..4395c3cf 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1132,3 +1132,4 @@ ec5d76ef-82fe-48da-b931-bdb25a62bc65 a21118de-b11e-4ebd-b655-42f11142df0c 0d80d088-a84c-4353-af1a-fc8b439f1564 b1729c57-9384-4d1c-9b99-9b220afb384e +1b83cddb-eaa7-45aa-98a5-85fb0a8807ea