From cfaea8c1fb435a15e9c5710d303c803f393e739c Mon Sep 17 00:00:00 2001 From: Atomic Red Team GUID generator Date: Mon, 26 Jun 2023 20:39:45 +0000 Subject: [PATCH] Generate GUIDs from job=generate-docs branch=master [skip ci] --- atomics/T1539/T1539.yaml | 1 + atomics/used_guids.txt | 1 + 2 files changed, 2 insertions(+) diff --git a/atomics/T1539/T1539.yaml b/atomics/T1539/T1539.yaml index 7a505d5b..4c510b69 100644 --- a/atomics/T1539/T1539.yaml +++ b/atomics/T1539/T1539.yaml @@ -78,6 +78,7 @@ atomic_tests: name: powershell elevation_required: false - name: Steal Chrome Cookies via Remote Debugging (Mac) + auto_generated_guid: e43cfdaf-3fb8-4a45-8de0-7eee8741d072 description: |- The remote debugging functionality in Chrome can be used by malware for post-exploitation activities to obtain cookies without requiring keychain access. By initiating Chrome with a remote debug port, an attacker can sidestep encryption and employ Chrome's own mechanisms to access cookies. diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 337b7a85..f70a145a 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1363,3 +1363,4 @@ d58d749c-4450-4975-a9e9-8b1d562755c2 096b6d2a-b63f-4100-8fa0-525da4cd25ca 562aa072-524e-459a-ba2b-91f1afccf5ab 8c992cb3-a46e-4fd5-b005-b1bab185af31 +e43cfdaf-3fb8-4a45-8de0-7eee8741d072