From 4fb62d48752dba61baac58a21c6de0dacbad19e9 Mon Sep 17 00:00:00 2001 From: CircleCI Atomic Red Team doc generator Date: Wed, 16 Oct 2019 18:16:43 +0000 Subject: [PATCH] Generate docs from job=validate_atomics_generate_docs branch=master --- atomics/T1055/T1055.md | 2 +- atomics/index.yaml | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/atomics/T1055/T1055.md b/atomics/T1055/T1055.md index 36bc6f45..b27d09f9 100644 --- a/atomics/T1055/T1055.md +++ b/atomics/T1055/T1055.md @@ -50,7 +50,7 @@ Windows 10 Utility To Inject DLLS #### Run it with `powershell`! Elevation Required (e.g. root or admin) ``` -mavinject $pid /INJECTRUNNING #{dll_payload} +mavinject #{process_id} /INJECTRUNNING #{dll_payload} ``` diff --git a/atomics/index.yaml b/atomics/index.yaml index 71781c75..6772d59c 100644 --- a/atomics/index.yaml +++ b/atomics/index.yaml @@ -9016,7 +9016,7 @@ defense-evasion: executor: name: powershell elevation_required: true - command: 'mavinject $pid /INJECTRUNNING #{dll_payload} + command: 'mavinject #{process_id} /INJECTRUNNING #{dll_payload} ' - name: Process Injection via PowerSploit @@ -12075,7 +12075,7 @@ privilege-escalation: executor: name: powershell elevation_required: true - command: 'mavinject $pid /INJECTRUNNING #{dll_payload} + command: 'mavinject #{process_id} /INJECTRUNNING #{dll_payload} ' - name: Process Injection via PowerSploit