From d1343687d415bcf7fe6ef0aef22cda198637c781 Mon Sep 17 00:00:00 2001 From: Atomic Red Team GUID generator Date: Mon, 21 Nov 2022 20:41:57 +0000 Subject: [PATCH] Generate GUIDs from job=generate-docs branch=master [skip ci] --- atomics/T1055.003/T1055.003.yaml | 1 + atomics/used_guids.txt | 1 + 2 files changed, 2 insertions(+) diff --git a/atomics/T1055.003/T1055.003.yaml b/atomics/T1055.003/T1055.003.yaml index 21d816c3..cfc11ba4 100644 --- a/atomics/T1055.003/T1055.003.yaml +++ b/atomics/T1055.003/T1055.003.yaml @@ -2,6 +2,7 @@ attack_technique: T1055.003 display_name: Thread Execution Hijacking atomic_tests: - name: Thread Execution Hijacking + auto_generated_guid: 578025d5-faa9-4f6d-8390-aae527d503e1 description: 'This test injects a MessageBox shellcode generated by msfvenom in Notepad.exe using Thread Execution Hijacking. When successful, a message box will appear with the "Atomic Red Team" caption after one or two seconds. ' supported_platforms: - windows diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 4993ef8d..d6461c18 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1191,3 +1191,4 @@ f0007753-beb3-41ea-9948-760785e4c1e5 7a0895f0-84c1-4adf-8491-a21510b1d4c1 515575ab-d213-42b1-aa64-ef6a2dd4641b b1cbdf8b-6078-48f5-a890-11ea19d7f8e9 +578025d5-faa9-4f6d-8390-aae527d503e1