Merge PR #4776 from @security-companion - Fix broken reference links
chore: fix some broken reference links Thanks: @security-companion
This commit is contained in:
committed by
GitHub
parent
49adcf9a00
commit
ba2baa1cec
@@ -6,7 +6,7 @@ related:
|
||||
status: test
|
||||
description: Detects an unexpected file being modified by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)
|
||||
references:
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns.exe.html
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns-exe.html
|
||||
author: Tim Rauch (Nextron Systems), Elastic (idea)
|
||||
date: 2022/09/27
|
||||
tags:
|
||||
|
||||
@@ -6,7 +6,7 @@ related:
|
||||
status: test
|
||||
description: Detects an unexpected file being deleted by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)
|
||||
references:
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns.exe.html
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns-exe.html
|
||||
author: Tim Rauch (Nextron Systems), Elastic (idea)
|
||||
date: 2022/09/27
|
||||
modified: 2023/02/15
|
||||
|
||||
@@ -3,7 +3,7 @@ id: a4e3d776-f12e-42c2-8510-9e6ed1f43ec3
|
||||
status: test
|
||||
description: Detects an unexpected process spawning from dns.exe which may indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)
|
||||
references:
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-child-process-of-dns.exe.html
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-child-process-of-dns-exe.html
|
||||
author: Tim Rauch, Elastic (idea)
|
||||
date: 2022/09/27
|
||||
modified: 2023/02/05
|
||||
|
||||
@@ -2711,7 +2711,7 @@ https://github.com/elastic/detection-rules/pull/1214
|
||||
https://twitter.com/Hexacorn/status/1420053502554951689
|
||||
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-5.1&viewFallbackFrom=powershell-7
|
||||
https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithSAML.html
|
||||
https://www.elastic.co/guide/en/security/current/unusual-child-process-of-dns.exe.html
|
||||
https://www.elastic.co/guide/en/security/current/unusual-child-process-of-dns-exe.html
|
||||
https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor
|
||||
https://www.securonix.com/blog/detecting-microsoft-msdt-dogwalk/
|
||||
https://github.com/3CORESec/MAL-CL/tree/master/Descriptors/Other/Advanced%20IP%20Scanner
|
||||
|
||||
Reference in New Issue
Block a user