From 53bb17be7c68b40ccae4d2eda276b865022bdb3d Mon Sep 17 00:00:00 2001 From: Atomic Red Team GUID generator Date: Thu, 1 Jun 2023 20:25:27 +0000 Subject: [PATCH] Generate GUIDs from job=generate-docs branch=master [skip ci] --- atomics/T1140/T1140.yaml | 1 + atomics/used_guids.txt | 1 + 2 files changed, 2 insertions(+) diff --git a/atomics/T1140/T1140.yaml b/atomics/T1140/T1140.yaml index cf91a239..44302082 100644 --- a/atomics/T1140/T1140.yaml +++ b/atomics/T1140/T1140.yaml @@ -211,6 +211,7 @@ atomic_tests: echo #{fish_encoded} | base64 -d | bash echo #{sh_encoded} | base64 -d | bash - name: 'XOR decoding and command execution using Python' + auto_generated_guid: c3b65cd5-ee51-4e98-b6a3-6cbdec138efc description: An adversary can obfuscate malicious commands or payloads using XOR and execute them on the victim's machine. This test uses Python to decode and execute commands on the machine. supported_platforms: - linux diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 1b4b8bab..2794ee46 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1347,3 +1347,4 @@ ffbcfd62-15d6-4989-a21a-80bfc8e58bb5 abf00f6c-9983-4d9a-afbc-6b1c6c6448e1 51a98f96-0269-4e09-a10f-e307779a8b05 fad04df1-5229-4185-b016-fb6010cd87ac +c3b65cd5-ee51-4e98-b6a3-6cbdec138efc