diff --git a/atomics/T1046/T1046.yaml b/atomics/T1046/T1046.yaml index 25be584b..4b8b5ac1 100644 --- a/atomics/T1046/T1046.yaml +++ b/atomics/T1046/T1046.yaml @@ -121,6 +121,7 @@ atomic_tests: python #{filename} -i #{host_ip} name: powershell - name: WinPwn - spoolvulnscan + auto_generated_guid: 54574908-f1de-4356-9021-8053dd57439a description: Start MS-RPRN RPC Service Scan using spoolvulnscan function of WinPwn supported_platforms: - windows @@ -131,6 +132,7 @@ atomic_tests: spoolvulnscan -noninteractive -consoleoutput name: powershell - name: WinPwn - MS17-10 + auto_generated_guid: 97585b04-5be2-40e9-8c31-82157b8af2d6 description: Search for MS17-10 vulnerable Windows Servers in the domain using powerSQL function of WinPwn supported_platforms: - windows @@ -141,6 +143,7 @@ atomic_tests: MS17-10 -noninteractive -consoleoutput name: powershell - name: WinPwn - bluekeep + auto_generated_guid: 1cca5640-32a9-46e6-b8e0-fabbe2384a73 description: Search for bluekeep vulnerable Windows Systems in the domain using bluekeep function of WinPwn. Can take many minutes to complete (~600 seconds in testing on a small domain). supported_platforms: - windows @@ -151,6 +154,7 @@ atomic_tests: bluekeep -noninteractive -consoleoutput name: powershell - name: WinPwn - fruit + auto_generated_guid: bb037826-cbe8-4a41-93ea-b94059d6bb98 description: Search for potentially vulnerable web apps (low hanging fruits) using fruit function of WinPwn supported_platforms: - windows diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 026a6c7d..edfded81 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -999,3 +999,7 @@ eea1d918-825e-47dd-acc2-814d6c58c0e1 7804659b-fdbf-4cf6-b06a-c03e758590e8 3278b2f6-f733-4875-9ef4-bfed34244f0a dec6a0d8-bcaf-4c22-9d48-2aee59fb692b +54574908-f1de-4356-9021-8053dd57439a +97585b04-5be2-40e9-8c31-82157b8af2d6 +1cca5640-32a9-46e6-b8e0-fabbe2384a73 +bb037826-cbe8-4a41-93ea-b94059d6bb98