Skip to content

Commit f1e1ed2

Browse files
authored
chore: archive new rule references and update cache file
1 parent f07e2b3 commit f1e1ed2

File tree

2 files changed

+113
-103
lines changed

2 files changed

+113
-103
lines changed

.github/latest_archiver_output.md

Lines changed: 105 additions & 103 deletions
Original file line numberDiff line numberDiff line change
@@ -1,133 +1,135 @@
11
# Reference Archiver Results
22

3-
Last Execution: 2023-12-01 01:53:38
3+
Last Execution: 2024-04-15 02:50:30
44

55
### Archiver Script Results
66

77

88
#### Newly Archived References
99

10-
- https://taiwan.postsen.com/business/88601/Hamas-hackers-use-data-destruction-software-BiBi-which-consumes-a-lot-of-processor-resources-to-wipe-Windows-computer-data--iThome.html
11-
- https://www.swascan.com/cactus-ransomware-malware-analysis/
10+
N/A
1211

1312
#### Already Archived References
1413

15-
- https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html
16-
- https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/
17-
- https://www.huntress.com/blog/confluence-to-cerber-exploitation-of-cve-2023-22518-for-ransomware-deployment
18-
- https://labs.withsecure.com/content/dam/labs/docs/f-secureLABS-tlp-white-lazarus-threat-intel-report2.pdf
19-
- https://www.crowdstrike.com/blog/windows-restart-manager-part-2/
20-
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msxsl/
21-
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
22-
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization
23-
- https://learn.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-remotely-starting-with-vista
14+
- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
15+
- https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
16+
- https://blog.hrncirik.net/cve-2023-46214-analysis
17+
- https://us-cert.cisa.gov/ncas/alerts/aa21-008a
18+
- https://attackerkb.com/topics/2faW2CxJgQ/cve-2023-4966
19+
- https://github.com/outflanknl/NetshHelperBeacon
20+
- https://github.com/api0cradle/LOLBAS/blob/d148d278f5f205ce67cfaf49afdfb68071c7252a/OSScripts/pester.md
21+
- https://www.rapid7.com/blog/post/2023/10/25/etr-cve-2023-4966-exploitation-of-citrix-netscaler-information-disclosure-vulnerability/
2422

2523
#### Error While Archiving References
2624

27-
- https://www.sans.org/cyber-security-summit/archives
25+
- https://www.cyberciti.biz/faq/linux-remove-user-command/
26+
- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
27+
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
28+
- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/
29+
- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf
30+
- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/
31+
- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
32+
- https://www.hexacorn.com/blog/2017/01/14/beyond-good-ol-run-key-part-53/
33+
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
2834
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
29-
- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/
30-
- https://www.group-ib.com/blog/apt41-world-tour-2021/
35+
- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/
3136
- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
37+
- https://github.com/nathan31337/Splunk-RCE-poc/
38+
- https://www.linkedin.com/pulse/guntior-story-advanced-bootkit-doesnt-rely-windows-disk-baranov-wue8e/
39+
- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
40+
- https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/
41+
- https://www.aon.com/cyber-solutions/aon_cyber_labs/linux-based-inter-process-code-injection-without-ptrace2/
3242
- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
33-
- http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
34-
- https://www.rnbo.gov.ua/files/2023_YEAR/CYBERCENTER/november/APT29%20attacks%20Embassies%20using%20CVE-2023-38831%20-%20report%20en.pdf
35-
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
36-
- https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/
37-
- https://linux.die.net/man/1/arecord
38-
- https://github.com/fortra/impacket/blob/edef71f17bc1240f9f8c957bbda98662951ac3ec/examples/smbexec.py#L60
39-
- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/
40-
- https://www.cyberciti.biz/faq/linux-remove-user-command/
41-
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
42-
- https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967
43-
- https://web.archive.org/web/20160928212230/https://www.adaptforward.com/2016/09/using-netshell-to-execute-evil-dlls-and-persist-on-a-host/
44-
- https://github.com/outflanknl/NetshHelperBeacon
43+
- https://github.com/grayhatkiller/SharpExShell
44+
- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/
45+
- https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2
46+
- https://us-cert.cisa.gov/ncas/alerts/aa21-259a
47+
- https://mp.weixin.qq.com/s/wUoBy7ZiqJL2CUOMC-8Wdg
48+
- https://advisory.splunk.com/advisories/SVD-2023-1104
49+
- https://github.com/ForceFledgling/CVE-2023-22518
50+
- https://megatools.megous.com/
51+
- https://pentestlab.blog/2019/10/29/persistence-netsh-helper-dll/
52+
- https://cydefops.com/devtunnels-unleashed
53+
- https://jsecurity101.medium.com/bypassing-access-mask-auditing-strategies-480fb641c158
54+
- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1
55+
- https://news.ycombinator.com/item?id=29504755
56+
- https://learn.microsoft.com/en-us/dotnet/api/system.security.cryptography?view=net-8.0
57+
- https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b
58+
- https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html
59+
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
60+
- https://grep.app/search?q=winpwn&filter[repo][0]=redcanaryco/atomic-red-team
61+
- https://www.cyberciti.biz/faq/how-force-kill-process-linux/
62+
- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
63+
- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/
64+
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
4565
- https://www.group-ib.com/resources/threat-research/red-curl-2.html
46-
- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/
66+
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
67+
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
68+
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
69+
- http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
70+
- https://www.sans.org/cyber-security-summit/archives
71+
- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf
4772
- https://github.com/fortra/impacket/blob/33058eb2fde6976ea62e04bc7d6b629d64d44712/examples/smbexec.py#L286-L296
48-
- https://linux.die.net/man/8/useradd
49-
- https://learn.microsoft.com/en-us/dotnet/core/runtime-config/debugging-profiling
50-
- https://attackerkb.com/topics/2faW2CxJgQ/cve-2023-4966
51-
- https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44
52-
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
53-
- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/
54-
- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195
55-
- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/
73+
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a
74+
- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662
5675
- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/
57-
- https://pentestlab.blog/2019/10/29/persistence-netsh-helper-dll/
58-
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
59-
- https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2
60-
- https://mp.weixin.qq.com/s/wUoBy7ZiqJL2CUOMC-8Wdg
61-
- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/
6276
- https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html
63-
- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
64-
- https://blog.hrncirik.net/cve-2023-46214-analysis
65-
- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/
77+
- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/
78+
- https://www.malwarebytes.com/blog/detections/pum-optional-nodispcpl
79+
- https://github.com/AonCyberLabs/Cexigua/blob/34d338620afae4c6335ba8d8d499e1d7d3d5d7b5/overwrite.sh
6680
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-eventlog?view=powershell-5.1
67-
- https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/
68-
- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
69-
- https://www.rapid7.com/blog/post/2023/10/25/etr-cve-2023-4966-exploitation-of-citrix-netscaler-information-disclosure-vulnerability/
70-
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
71-
- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/
81+
- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/
82+
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
83+
- https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd
84+
- https://linux.die.net/man/1/arecord
85+
- https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin
7286
- http://www.solomonson.com/posts/2010-07-09-reading-eventviewer-command-line/
73-
- https://cydefops.com/vscode-data-exfiltration
74-
- https://news.ycombinator.com/item?id=29504755
87+
- https://blogs.vmware.com/security/2023/11/jupyter-rising-an-update-on-jupyter-infostealer.html
88+
- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/
89+
- https://www.publicnow.com/view/EB87DB49C654D9B63995FAD4C9DE3D3CC4F6C3ED?1671634841
90+
- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195
91+
- https://github.com/redcanaryco/atomic-red-team/blob/4d6c4e8e23d465af7a2388620cfe3f8c76e16cf0/atomics/T1082/T1082.md
92+
- https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967
93+
- https://linux.die.net/man/8/useradd
94+
- https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
95+
- https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/
96+
- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/
97+
- https://web.archive.org/web/20160928212230/https://www.adaptforward.com/2016/09/using-netshell-to-execute-evil-dlls-and-persist-on-a-host/
98+
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
7599
- https://www.crowdstrike.com/blog/windows-restart-manager-part-1/
100+
- https://www.ired.team/offensive-security/persistence/t1128-netsh-helper-dll
101+
- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/
102+
- https://reconshell.com/winpwn-tool-for-internal-windows-pentesting-and-ad-security/
103+
- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/
104+
- https://www.group-ib.com/blog/apt41-world-tour-2021/
76105
- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
77-
- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
78-
- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662
79-
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
80-
- https://www.fortinet.com/blog/threat-research/konni-campaign-distributed-via-malicious-document
81-
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
82-
- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/
83-
- https://www.hexacorn.com/blog/2017/01/14/beyond-good-ol-run-key-part-53/
84-
- https://www.linkedin.com/pulse/guntior-story-advanced-bootkit-doesnt-rely-windows-disk-baranov-wue8e/
85-
- https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b
106+
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
107+
- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
108+
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
109+
- https://community.f5.com/t5/technical-forum/icontrolrest-11-5-execute-bash-command/td-p/203029
110+
- https://www.rnbo.gov.ua/files/2023_YEAR/CYBERCENTER/november/APT29%20attacks%20Embassies%20using%20CVE-2023-38831%20-%20report%20en.pdf
111+
- https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
112+
- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
113+
- https://ngrok.com/blog-post/new-ngrok-domains
114+
- https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-imaploader-malware.html
115+
- https://squiblydoo.blog/2023/11/07/october-2023-solarmarker/
86116
- https://paper.seebug.org/1495/
87-
- https://github.com/nathan31337/Splunk-RCE-poc/
88-
- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/
117+
- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/
89118
- https://github.com/assetnote/exploits/tree/main/citrix/CVE-2023-4966
90-
- https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/
91-
- https://ngrok.com/blog-post/new-ngrok-domains
92-
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
93-
- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
94-
- https://www.cyberciti.biz/faq/how-force-kill-process-linux/
95-
- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf
96-
- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/
97-
- https://www.malwarebytes.com/blog/detections/pum-optional-nodispcpl
98-
- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/
99-
- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/
100-
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
101-
- https://cydefops.com/devtunnels-unleashed
102-
- https://github.com/api0cradle/LOLBAS/blob/d148d278f5f205ce67cfaf49afdfb68071c7252a/OSScripts/pester.md
103-
- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
104-
- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1
105-
- https://community.f5.com/t5/technical-forum/icontrolrest-11-5-execute-bash-command/td-p/203029
106-
- https://us-cert.cisa.gov/ncas/alerts/aa21-259a
119+
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
107120
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a
108-
- https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
109-
- https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html
110-
- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
111-
- https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
112-
- https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd
121+
- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/
122+
- https://www.splunk.com/en_us/blog/security/you-bet-your-lsass-hunting-lsass-access.html
123+
- https://cydefops.com/vscode-data-exfiltration
124+
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
125+
- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
126+
- https://www.virustotal.com/gui/file/39102fb7bb6a74a9c8cb6d46419f9015b381199ea8524c1376672b30fffd69d2
113127
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode
114-
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
115-
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
116-
- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
117-
- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
118-
- https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
119-
- https://www.ired.team/offensive-security/persistence/t1128-netsh-helper-dll
120-
- https://www.malwarebytes.com/blog/detections/pum-optional-nodispbackgroundpage
121-
- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/
122-
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a
123-
- https://us-cert.cisa.gov/ncas/alerts/aa21-008a
128+
- https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/
124129
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.diagnostics/get-winevent?view=powershell-7.3
125-
- https://megatools.megous.com/
126-
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
127-
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
128-
- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf
129-
- https://advisory.splunk.com/advisories/SVD-2023-1104
130-
- https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-imaploader-malware.html
131-
- https://github.com/grayhatkiller/SharpExShell
132-
- https://github.com/ForceFledgling/CVE-2023-22518
133-
- https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin
130+
- https://github.com/fortra/impacket/blob/edef71f17bc1240f9f8c957bbda98662951ac3ec/examples/smbexec.py#L60
131+
- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/
132+
- https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44
133+
- https://www.fortinet.com/blog/threat-research/konni-campaign-distributed-via-malicious-document
134+
- https://learn.microsoft.com/en-us/dotnet/core/runtime-config/debugging-profiling
135+
- https://www.malwarebytes.com/blog/detections/pum-optional-nodispbackgroundpage

tests/rule-references.txt

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3473,3 +3473,11 @@ https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provid
34733473
https://learn.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-remotely-starting-with-vista
34743474
https://taiwan.postsen.com/business/88601/Hamas-hackers-use-data-destruction-software-BiBi-which-consumes-a-lot-of-processor-resources-to-wipe-Windows-computer-data--iThome.html
34753475
https://www.swascan.com/cactus-ransomware-malware-analysis/
3476+
https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
3477+
https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
3478+
https://blog.hrncirik.net/cve-2023-46214-analysis
3479+
https://us-cert.cisa.gov/ncas/alerts/aa21-008a
3480+
https://attackerkb.com/topics/2faW2CxJgQ/cve-2023-4966
3481+
https://github.com/outflanknl/NetshHelperBeacon
3482+
https://github.com/api0cradle/LOLBAS/blob/d148d278f5f205ce67cfaf49afdfb68071c7252a/OSScripts/pester.md
3483+
https://www.rapid7.com/blog/post/2023/10/25/etr-cve-2023-4966-exploitation-of-citrix-netscaler-information-disclosure-vulnerability/

0 commit comments

Comments
 (0)