From cc5498aee50fb8793e169ecc9ff0a5bc671bea05 Mon Sep 17 00:00:00 2001 From: Atomic Red Team GUID generator Date: Tue, 31 May 2022 17:14:13 +0000 Subject: [PATCH] Generate GUIDs from job=generate-docs branch=master [skip ci] --- atomics/T1110.003/T1110.003.yaml | 1 + atomics/used_guids.txt | 1 + 2 files changed, 2 insertions(+) diff --git a/atomics/T1110.003/T1110.003.yaml b/atomics/T1110.003/T1110.003.yaml index 5addc04a..812f2ce3 100644 --- a/atomics/T1110.003/T1110.003.yaml +++ b/atomics/T1110.003/T1110.003.yaml @@ -225,6 +225,7 @@ atomic_tests: } Invoke-dpsLight "#{password}" $env:Temp\usersdpsLight.txt - name: Password Spray Microsoft Online Accounts with MSOLSpray (Azure/O365) + auto_generated_guid: f3a10056-0160-4785-8744-d9bd7c12dc39 description: | This test attempts to brute force a list of Microsoft Online (Azure/O365) users with a single password via the MSOLSpray Powershell module. supported_platforms: diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 4044b2d5..04df031a 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1058,3 +1058,4 @@ b15bc9a5-a4f3-4879-9304-ea0011ace63a ed0335ac-0354-400c-8148-f6151d20035a 13c0804e-615e-43ad-b223-2dfbacd0b0b3 82a9f001-94c5-495e-9ed5-f530dbded5e2 +f3a10056-0160-4785-8744-d9bd7c12dc39