From fca809efa6318e1b6d4cc92d7006fd0dd6f5317b Mon Sep 17 00:00:00 2001 From: CircleCI Atomic Red Team doc generator Date: Wed, 13 Jan 2021 19:12:56 +0000 Subject: [PATCH] Generate docs from job=generate_and_commit_guids_and_docs branch=master [skip ci] --- atomics/Indexes/index.yaml | 4 +++- atomics/T1127.001/T1127.001.md | 2 +- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml index 632f88fe..9780bd31 100644 --- a/atomics/Indexes/index.yaml +++ b/atomics/Indexes/index.yaml @@ -33481,7 +33481,9 @@ defense-evasion: atomic_tests: - name: MSBuild Bypass Using Inline Tasks auto_generated_guid: 58742c0f-cb01-44cd-a60b-fb26e8871c93 - description: 'Executes the code in a project file using. C# Example + description: 'Executes the code in a project file using msbuild.exe. The default + C# project example file (T1127.001.csproj) will simply print "Hello From a + Code Fragment" and "Hello From a Class." to the screen. ' supported_platforms: diff --git a/atomics/T1127.001/T1127.001.md b/atomics/T1127.001/T1127.001.md index 3739b39d..078d1871 100644 --- a/atomics/T1127.001/T1127.001.md +++ b/atomics/T1127.001/T1127.001.md @@ -12,7 +12,7 @@ Adversaries can abuse MSBuild to proxy execution of malicious code. The inline t
## Atomic Test #1 - MSBuild Bypass Using Inline Tasks -Executes the code in a project file using. C# Example +Executes the code in a project file using msbuild.exe. The default C# project example file (T1127.001.csproj) will simply print "Hello From a Code Fragment" and "Hello From a Class." to the screen. **Supported Platforms:** Windows