From a37b0492e71c08c1b4e91c1df28bda9dd04aee15 Mon Sep 17 00:00:00 2001 From: Leo Verlod <96517806+Leomon5@users.noreply.github.com> Date: Tue, 23 Aug 2022 01:33:19 -0500 Subject: [PATCH] Update T1528.yaml --- atomics/T1528/T1528.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/atomics/T1528/T1528.yaml b/atomics/T1528/T1528.yaml index fd252d6f..287c05c3 100644 --- a/atomics/T1528/T1528.yaml +++ b/atomics/T1528/T1528.yaml @@ -3,7 +3,7 @@ display_name: Steal Application Access Token atomic_tests: - name: Azure - Dump All Azure Key Vaults with Microburst description: Upon successful execution of this test, the names, locations, and contents of key vaults within an Azure account will be output to a file. - See- https://www.netspi.com/blog/technical/cloud-penetration-testing/a-beginners-guide-to-gathering-azure-passwords/ + See - https://www.netspi.com/blog/technical/cloud-penetration-testing/a-beginners-guide-to-gathering-azure-passwords/ supported_platforms: - iaas:azure input_arguments: