diff --git a/code/privilege-escalation/linux/binary/privesc-pexec.yaml b/code/privilege-escalation/linux/binary/privesc-pexec.yaml
index 7b8de9dfc4e..065334a6624 100644
--- a/code/privilege-escalation/linux/binary/privesc-pexec.yaml
+++ b/code/privilege-escalation/linux/binary/privesc-pexec.yaml
@@ -7,7 +7,7 @@ info:
description: |
The term "pexec" typically refers to the "privileged execution" of a command or program.
reference:
- https://gtfobins.github.io/gtfobins/pexec/
+ - https://gtfobins.github.io/gtfobins/pexec/
metadata:
verified: true
max-request: 3
diff --git a/file/audit/pfsense/configure-dns-server.yaml b/file/audit/pfsense/configure-dns-server.yaml
index 62182780fd7..9f75d776684 100644
--- a/file/audit/pfsense/configure-dns-server.yaml
+++ b/file/audit/pfsense/configure-dns-server.yaml
@@ -7,7 +7,7 @@ info:
description: |
DNS is recommended to be configured over TLS. This prevents intermediate parties and potential attackers from viewing the content of DNS queries and can also assure that DNS is being provided by the expected DNS servers.
reference:
- https://docs.netgate.com/pfsense/en/latest/recipes/dns-over-tls.html
+ - https://docs.netgate.com/pfsense/en/latest/recipes/dns-over-tls.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
diff --git a/file/audit/pfsense/configure-session-timeout.yaml b/file/audit/pfsense/configure-session-timeout.yaml
index cb14d9699eb..2002fb49b8b 100644
--- a/file/audit/pfsense/configure-session-timeout.yaml
+++ b/file/audit/pfsense/configure-session-timeout.yaml
@@ -7,7 +7,7 @@ info:
description: |
Configure sessions timeout is recommended to be enabled. An indefinite or even long session timeout window can increase the risk of an attacker abusing abandoned sessions and potentially being able to obtain sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
+ - https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
diff --git a/file/audit/pfsense/enable-https-protocol.yaml b/file/audit/pfsense/enable-https-protocol.yaml
index fa2018363e6..b9dc9a58669 100644
--- a/file/audit/pfsense/enable-https-protocol.yaml
+++ b/file/audit/pfsense/enable-https-protocol.yaml
@@ -7,7 +7,7 @@ info:
description: |
PfSense Web Admin Management Portal is recommended to be accessible using only HTTPS protocol. HTTP transmits all data, including passwords, in clear text over the network and provides no assurance of the identity of the hosts involved, making it possible for an attacker to obtain sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
+ - https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
diff --git a/file/audit/pfsense/password-protected-consolemenu.yaml b/file/audit/pfsense/password-protected-consolemenu.yaml
index c92be069fd6..33bad6e78c9 100644
--- a/file/audit/pfsense/password-protected-consolemenu.yaml
+++ b/file/audit/pfsense/password-protected-consolemenu.yaml
@@ -7,7 +7,7 @@ info:
description: |
PfSense password protection via the Console Menu is recommended to be configured. An unattended computer with an open Console Menu session can allow an unauthorized user access to the firewall management.
reference:
- https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
+ - https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
diff --git a/file/audit/pfsense/set-hostname.yaml b/file/audit/pfsense/set-hostname.yaml
index 63ac1849049..5b2c96affa2 100644
--- a/file/audit/pfsense/set-hostname.yaml
+++ b/file/audit/pfsense/set-hostname.yaml
@@ -7,7 +7,7 @@ info:
description: |
PfSense Hostname should be set so that other devices on the network can correctly identify it. The hostname is a unique identifier for the device.
reference:
- https://docs.netgate.com/pfsense/en/latest/config/general.html
+ - https://docs.netgate.com/pfsense/en/latest/config/general.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
diff --git a/file/malware/hash/turla-malware-hash.yaml b/file/malware/hash/turla-malware-hash.yaml
index d0b9813536a..1af0331d3b1 100644
--- a/file/malware/hash/turla-malware-hash.yaml
+++ b/file/malware/hash/turla-malware-hash.yaml
@@ -5,8 +5,8 @@ info:
severity: info
description: Detects Turla malware based on sample used in the RUAG APT case
reference:
- https://www.govcert.admin.ch/blog/22/technical-report-about-the-ruag-espionage-case
- https://github.com/Yara-Rules/rules/blob/master/malware/APT_Turla_RUAG.yar
+ - https://www.govcert.admin.ch/blog/22/technical-report-about-the-ruag-espionage-case
+ - https://github.com/Yara-Rules/rules/blob/master/malware/APT_Turla_RUAG.yar
tags: malware,turla,apt,ruag
file:
diff --git a/file/malware/hash/unit78020-malware-hash.yaml b/file/malware/hash/unit78020-malware-hash.yaml
index 88e7268ccc6..b506a3e4241 100644
--- a/file/malware/hash/unit78020-malware-hash.yaml
+++ b/file/malware/hash/unit78020-malware-hash.yaml
@@ -6,8 +6,8 @@ info:
description: |
Detects malware by Chinese APT PLA Unit 78020 - Generic Rule
reference:
- http://threatconnect.com/camerashy/?utm_campaign=CameraShy
- https://github.com/Yara-Rules/rules/blob/master/malware/APT_Unit78020.yar
+ - http://threatconnect.com/camerashy/?utm_campaign=CameraShy
+ - https://github.com/Yara-Rules/rules/blob/master/malware/APT_Unit78020.yar
tags: malware,unit78020
file:
diff --git a/http/cves/2014/CVE-2014-100004.yaml b/http/cves/2014/CVE-2014-100004.yaml
index 9c55fe72636..2d84a3c8474 100644
--- a/http/cves/2014/CVE-2014-100004.yaml
+++ b/http/cves/2014/CVE-2014-100004.yaml
@@ -1,15 +1,22 @@
-id: sitecore-xml-xss
+id: CVE-2014-100004
info:
- name: SiteCore XML Control Script Insertion
+ name: Sitecore CMS - Cross-Site Scripting
author: DhiyaneshDK
severity: medium
description: |
- Sitecores “special way” of displaying XML Controls directly allows for a Cross Site Scripting Attack – more can be achieved with these XML Controls
+ Sitecore CMS contains a cross-site scripting vulnerability via the "special way" of displaying XML Controls directly, which allows for a Cross Site Scripting Attack.
reference:
- https://vulners.com/securityvulns/SECURITYVULNS:DOC:30273
- https://web.archive.org/web/20151016072340/http://www.securityfocus.com/archive/1/530901/100/0/threaded
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-100004
classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
+ cve-id: CVE-2014-100004
+ epss-score: 0.00385
+ epss-percentile: 0.59034
+ cwe-id: CWE-79
cpe: cpe:2.3:a:sitecore:sitecore.net:*:*:*:*:*:*:*:*
metadata:
verified: "true"
@@ -17,7 +24,7 @@ info:
vendor: sitecore
product: sitecore.net
shodan-query: html:"Sitecore"
- tags: xss,sitecore,cms
+ tags: cve,cve2014,xss,sitecore,cms,vuln
http:
- method: GET
@@ -39,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e1a5d9bb8833a1a078d73d226c6ea9da6b43c5e79eee307798007a40d6b4996d022100ae77daa481f74c23854134ef24a5c0864e3682f686e3ebd0d89f70563d3a2563:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c97e57d30dceb78ef802a4f114eb2bbfcfe80edfc3eb1169e64483eeeda693bc02201c017e6a1dca8ada5d4394c93d1fdc9ab7d1a05127480852434075da10eb94c8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2015/CVE-2015-6477.yaml b/http/cves/2015/CVE-2015-6477.yaml
index ec36518b4dd..2d7292b2ef8 100644
--- a/http/cves/2015/CVE-2015-6477.yaml
+++ b/http/cves/2015/CVE-2015-6477.yaml
@@ -2,7 +2,7 @@ id: CVE-2015-6477
info:
name: Nordex NC2 - Cross-Site Scripting
- author: geeknik
+ author: geeknik,daffainfo
severity: medium
description: Nordex NC2 contains a cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
impact: |
@@ -14,27 +14,30 @@ info:
- https://ics-cert.us-cert.gov/advisories/ICSA-15-286-01
- https://nvd.nist.gov/vuln/detail/CVE-2015-6477
- http://packetstormsecurity.com/files/135068/Nordex-Control-2-NC2-SCADA-16-Cross-Site-Scripting.html
- - http://seclists.org/fulldisclosure/2015/Dec/117
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2015-6477
cwe-id: CWE-79
- epss-score: 0.3338
- epss-percentile: 0.96688
+ epss-score: 0.3474
+ epss-percentile: 0.96816
cpe: cpe:2.3:o:nordex:nordex_control_2_scada:*:*:*:*:*:*:*:*
metadata:
max-request: 1
+ verified: true
vendor: nordex
product: nordex_control_2_scada
- tags: cve2015,cve,seclists,packetstorm,xss,iot,nordex,nc2
+ shodan-query: http.title:"Nordex Control - Wind Farm Portal"
+ tags: cve,cve2015,nordex,nc2,seclists,packetstorm,xss,iot,vuln
http:
- - method: POST
- path:
- - "{{BaseURL}}/login"
+ - raw:
+ - |
+ POST /login HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
- body: 'connection=basic&userName=admin%27%22%29%3B%7D%3C%2Fscript%3E%3Cscript%3Ealert%28%27{{randstr}}%27%29%3C%2Fscript%3E&pw=nordex&language=en'
+ connection=basic&userName=admin%27%22%29%3B%7D%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&pw=nordex&language=en
matchers-condition: and
matchers:
@@ -46,5 +49,10 @@ http:
- type: word
part: body
words:
- - ""
-# digest: 4a0a00473045022100931a43680b8786e206dccd77e69225a4fa3620429fb6435835b32ba4f90331f2022062f76ad7d3592c18ef5289a356efcb12e35e72f8200e80a2058cb984395a2c96:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+ - ""
+ - "var detailParams"
+ condition: and
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/http/cves/2021/CVE-2021-42565.yaml b/http/cves/2021/CVE-2021-42565.yaml
index e3a0ca5bf42..0ff10579d1f 100644
--- a/http/cves/2021/CVE-2021-42565.yaml
+++ b/http/cves/2021/CVE-2021-42565.yaml
@@ -2,38 +2,38 @@ id: CVE-2021-42565
info:
name: myfactory FMS - Cross-Site Scripting
- author: madrobot
+ author: madrobot,daffainfo
severity: medium
- description: myfactory.FMS before 7.1-912 allows cross-site scripting via the UID parameter.
+ description: |
+ myfactory.FMS before 7.1-912 allows cross-site scripting via the UID parameter.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of a user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2021-42565
- - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms
- https://www.redteam-pentesting.de/advisories/rt-sa-2021-001
- https://github.com/ARPSyndicate/cvemon
- - https://github.com/ARPSyndicate/kenzer-templates
+ - https://nvd.nist.gov/vuln/detail/CVE-2021-42565
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-42565
cwe-id: CWE-79
- epss-score: 0.0205
- epss-percentile: 0.83156
+ epss-score: 0.01052
+ epss-percentile: 0.76872
cpe: cpe:2.3:a:myfactory:fms:*:*:*:*:*:*:*:*
metadata:
- max-request: 2
+ verified: true
+ max-request: 1
vendor: myfactory
product: fms
- tags: cve2021,cve,myfactory,xss
+ google-query: inurl:ie50/system/ intitle:"myfactory"
+ tags: cve2021,cve,myfactory,xss,vuln
http:
- method: GET
path:
- - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Denied&UID=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
- - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Denied&UID=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
+ - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Denied&UID=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
matchers-condition: and
matchers:
@@ -41,6 +41,8 @@ http:
part: body
words:
- ""
+ - 'name="txtUID"'
+ - 'function mOnLoad()'
condition: and
- type: word
@@ -50,5 +52,4 @@ http:
- type: status
status:
- - 200
-# digest: 490a0046304402203d874d44461470d3db2a6cff1f541f60124c6d4bf185b9af11ddaab53cc4621f022031646314735b62c3e0ce1efbb35d57a61b1920d04eb78d5d2def56e26f0ddf1b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+ - 200
\ No newline at end of file
diff --git a/http/cves/2021/CVE-2021-42566.yaml b/http/cves/2021/CVE-2021-42566.yaml
index f45883c689a..43d4887e94f 100644
--- a/http/cves/2021/CVE-2021-42566.yaml
+++ b/http/cves/2021/CVE-2021-42566.yaml
@@ -2,45 +2,46 @@ id: CVE-2021-42566
info:
name: myfactory FMS - Cross-Site Scripting
- author: madrobot
+ author: madrobot,daffainfo
severity: medium
- description: myfactory.FMS before 7.1-912 allows cross-site scripting via the Error parameter.
+ description: |
+ myfactory.FMS before 7.1-912 allows cross-site scripting via the Error parameter.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of a victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2021-42566
- - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42566
- https://www.redteam-pentesting.de/advisories/rt-sa-2021-001
- - https://github.com/ARPSyndicate/cvemon
+ - https://nvd.nist.gov/vuln/detail/CVE-2021-42566
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-42566
cwe-id: CWE-79
- epss-score: 0.0205
- epss-percentile: 0.83156
+ epss-score: 0.01052
+ epss-percentile: 0.76872
cpe: cpe:2.3:a:myfactory:fms:*:*:*:*:*:*:*:*
metadata:
- max-request: 2
+ verified: true
+ max-request: 1
vendor: myfactory
product: fms
- tags: cve2021,cve,myfactory,xss
+ google-query: inurl:ie50/system/ intitle:"myfactory"
+ tags: cve,cve2021,myfactory,xss,vuln
http:
- method: GET
path:
- - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Error&Error=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
- - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Error&Error=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
+ - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Error&Error=%27%29%3Balert%28document%2Edomain%29%3B%2F%2F'
matchers-condition: and
matchers:
- type: word
part: body
words:
- - ""
+ - ';alert(document.domain);'
+ - 'name="txtUID"'
+ - 'function mOnLoad()'
condition: and
- type: word
@@ -50,5 +51,4 @@ http:
- type: status
status:
- - 200
-# digest: 4a0a00473045022100f4a74eb5e1a907294f4283c930ab7b6bcfb3c42048b2c4ddb6373817773c738202205b297f01ae71d684f0cd48148d4d793dcc2659447c51efa978ebd235add0c77f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+ - 200
\ No newline at end of file
diff --git a/http/exposed-panels/c2/covenant-c2.yaml b/http/exposed-panels/c2/covenant-c2.yaml
index 1af71a006fb..c0fbb029aa5 100644
--- a/http/exposed-panels/c2/covenant-c2.yaml
+++ b/http/exposed-panels/c2/covenant-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier,and serve as a collaborative command and control platform for red teamers.
reference:
- https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
+ - https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
metadata:
verified: true
max-request: 1
diff --git a/http/exposed-panels/c2/deimos-c2.yaml b/http/exposed-panels/c2/deimos-c2.yaml
index 2ac148b1422..078b19a5482 100644
--- a/http/exposed-panels/c2/deimos-c2.yaml
+++ b/http/exposed-panels/c2/deimos-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. DeimosC2 server and agents works on, and has been tested on, Windows, Darwin, and Linux.It is entirely written in Golang with a front end written in Vue.js.
reference:
- https://twitter.com/MichalKoczwara/status/1551632627387473920
+ - https://twitter.com/MichalKoczwara/status/1551632627387473920
metadata:
verified: true
max-request: 1
diff --git a/http/exposed-panels/c2/mythic-c2.yaml b/http/exposed-panels/c2/mythic-c2.yaml
index d9c8d1235ea..dfd6a20aeba 100644
--- a/http/exposed-panels/c2/mythic-c2.yaml
+++ b/http/exposed-panels/c2/mythic-c2.yaml
@@ -8,7 +8,7 @@ info:
A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.
It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
reference:
- https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
+ - https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
metadata:
verified: true
max-request: 1
diff --git a/http/exposures/logs/opentsdb-status.yaml b/http/exposures/logs/opentsdb-status.yaml
index 4fe425b3be1..030f9193e90 100644
--- a/http/exposures/logs/opentsdb-status.yaml
+++ b/http/exposures/logs/opentsdb-status.yaml
@@ -4,9 +4,10 @@ info:
name: OpenTSDB - Detect
author: pussycat0x
severity: low
- description: OpenTSDB stats exposed which is commonly used in monitoring and observability scenarios where tracking and analyzing the performance of systems, applications, and infrastructure over time is essential.
+ description: |
+ OpenTSDB stats exposed which is commonly used in monitoring and observability scenarios where tracking and analyzing the performance of systems, applications, and infrastructure over time is essential.
reference:
- http://opentsdb.net/
+ - http://opentsdb.net/
classification:
cpe: cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*
metadata:
diff --git a/http/misconfiguration/symfony/symfony-default-key-rce.yaml b/http/misconfiguration/symfony/symfony-default-key-rce.yaml
index 3ca254d54fd..ca54ec87c0b 100644
--- a/http/misconfiguration/symfony/symfony-default-key-rce.yaml
+++ b/http/misconfiguration/symfony/symfony-default-key-rce.yaml
@@ -8,10 +8,10 @@ info:
Symfony servers support a "/_fragment" command that allows clients to provide custom PHP commands and return the HTML output.
This template checks to see if they also use a popular default secret key for remote command execution.
reference:
- https://portswigger.net/daily-swig/symfony-based-websites-open-to-rce-attack-research-finds
- https://medium.com/@m4cddr/how-i-got-rce-in-10-websites-26dd87441f22
- https://al1z4deh.medium.com/how-i-hacked-28-sites-at-once-rce-5458211048d5
- https://github.com/ambionics/symfony-exploits
+ - https://portswigger.net/daily-swig/symfony-based-websites-open-to-rce-attack-research-finds
+ - https://medium.com/@m4cddr/how-i-got-rce-in-10-websites-26dd87441f22
+ - https://al1z4deh.medium.com/how-i-hacked-28-sites-at-once-rce-5458211048d5
+ - https://github.com/ambionics/symfony-exploits
metadata:
max-request: 12
shodan-query: http.html:"Symfony Profiler"
diff --git a/http/technologies/default-sitecore-page.yaml b/http/technologies/default-sitecore-page.yaml
index 7b051342aa3..64071b18fba 100644
--- a/http/technologies/default-sitecore-page.yaml
+++ b/http/technologies/default-sitecore-page.yaml
@@ -7,7 +7,7 @@ info:
description: |
Detect Sitecore Content Management System (CMS).
reference:
- https://www.sitecore.com/
+ - https://www.sitecore.com/
classification:
cpe: cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*
metadata:
diff --git a/http/technologies/sitecore-cms.yaml b/http/technologies/sitecore-cms.yaml
index df9eb458a10..6c14cfb54d9 100644
--- a/http/technologies/sitecore-cms.yaml
+++ b/http/technologies/sitecore-cms.yaml
@@ -7,7 +7,7 @@ info:
description: |
Detect Sitecore Content Management System (CMS) websites based on a redirect from the sitecore media handler URL pattern to the notfound.aspx page.
reference:
- https://www.sitecore.com
+ - https://www.sitecore.com
classification:
cpe: cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*
metadata:
diff --git a/network/detection/rtsp-detect.yaml b/network/detection/rtsp-detect.yaml
index 00ac2feb0f6..959a54624ec 100644
--- a/network/detection/rtsp-detect.yaml
+++ b/network/detection/rtsp-detect.yaml
@@ -7,7 +7,7 @@ info:
description: |
RTSP was detected.
reference:
- https://nmap.org/nsedoc/scripts/rtsp-methods.html
+ - https://nmap.org/nsedoc/scripts/rtsp-methods.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
diff --git a/network/jarm/c2/posh-c2-jarm.yaml b/network/jarm/c2/posh-c2-jarm.yaml
index f75ad968c87..011eb9cbbf5 100644
--- a/network/jarm/c2/posh-c2-jarm.yaml
+++ b/network/jarm/c2/posh-c2-jarm.yaml
@@ -7,7 +7,7 @@ info:
description: |
PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.
reference:
- - - https://github.com/cedowens/C2-JARM
+ - https://github.com/cedowens/C2-JARM
- https://twitter.com/MichalKoczwara/status/1551639708949692416
- https://poshc2.readthedocs.io/en/latest/
metadata:
diff --git a/ssl/c2/asyncrat-c2.yaml b/ssl/c2/asyncrat-c2.yaml
index f0a26bb9f2e..438c04f00f3 100644
--- a/ssl/c2/asyncrat-c2.yaml
+++ b/ssl/c2/asyncrat-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victim’s computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.
reference:
- https://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
+ - https://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/covenant-c2-ssl.yaml b/ssl/c2/covenant-c2-ssl.yaml
index 8a2a959d4fd..1e733ea0f75 100644
--- a/ssl/c2/covenant-c2-ssl.yaml
+++ b/ssl/c2/covenant-c2-ssl.yaml
@@ -7,7 +7,7 @@ info:
description: |
Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier,and serve as a collaborative command and control platform for red teamers.
reference:
- https://twitter.com/MichalKoczwara/status/1548685058403360770
+ - https://twitter.com/MichalKoczwara/status/1548685058403360770
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/dcrat-server-c2.yaml b/ssl/c2/dcrat-server-c2.yaml
index 9b14c9e8621..9ffe59922ba 100644
--- a/ssl/c2/dcrat-server-c2.yaml
+++ b/ssl/c2/dcrat-server-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
DCRat uses a modular framework that deploys separate executables for each module, most of which are compiled . net binaries programmed in C#.
reference:
- https://github.com/thehappydinoa/awesome-censys-queries#dcrat--
+ - https://github.com/thehappydinoa/awesome-censys-queries#dcrat--
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/gozi-malware-c2.yaml b/ssl/c2/gozi-malware-c2.yaml
index be8e73ec99c..5a927dff595 100644
--- a/ssl/c2/gozi-malware-c2.yaml
+++ b/ssl/c2/gozi-malware-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
Gozi is a banking Trojan that has been modified to include new obfuscation techniques, to evade detection. Previous breaches involving Gozi in the healthcare sector led to the compromise of data associated with 3.7 million patients costing $5.55 million.
reference:
- https://github.com/thehappydinoa/awesome-censys-queries#gozi-malware--
+ - https://github.com/thehappydinoa/awesome-censys-queries#gozi-malware--
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/metasploit-c2.yaml b/ssl/c2/metasploit-c2.yaml
index 84de879312f..b40e60f366f 100644
--- a/ssl/c2/metasploit-c2.yaml
+++ b/ssl/c2/metasploit-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
A Metasploit Framework is a powerful tool that provides a universal interface to work with vulnerability exploit code. It has to exploit code for a wide range of vulnerabilities that impact web servers, OSes, network equipment, and everything in between. Metasploit which serves as both exploitation and C2 frameworks.
reference:
- https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
+ - https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/mythic-c2-ssl.yaml b/ssl/c2/mythic-c2-ssl.yaml
index b1dbb40b523..7ecb18b1531 100644
--- a/ssl/c2/mythic-c2-ssl.yaml
+++ b/ssl/c2/mythic-c2-ssl.yaml
@@ -7,8 +7,8 @@ info:
description: |
Mythic is a multiplayer, command and control platform for red teaming operations
reference:
- https://docs.mythic-c2.net
- https://www.team-cymru.com/post/mythic-case-study-assessing-common-offensive-security-tools
+ - https://docs.mythic-c2.net
+ - https://www.team-cymru.com/post/mythic-case-study-assessing-common-offensive-security-tools
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/orcus-rat-c2.yaml b/ssl/c2/orcus-rat-c2.yaml
index 03f368e70d7..8510fca5876 100644
--- a/ssl/c2/orcus-rat-c2.yaml
+++ b/ssl/c2/orcus-rat-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
Orcus RAT is a type of malicious software program that enables remote access and control of computers and networks. It is a type of Remote Access Trojan (RAT) that has been used by attackers to gain access to and control computers and networks.
reference:
- https://github.com/thehappydinoa/awesome-censys-queries#orcusrat--
+ - https://github.com/thehappydinoa/awesome-censys-queries#orcusrat--
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/quasar-rat-c2.yaml b/ssl/c2/quasar-rat-c2.yaml
index 65c477536c3..e5bdb85dd46 100644
--- a/ssl/c2/quasar-rat-c2.yaml
+++ b/ssl/c2/quasar-rat-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
Quasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
reference:
- https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
+ - https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
metadata:
verified: "true"
max-request: 1
diff --git a/ssl/c2/sliver-c2.yaml b/ssl/c2/sliver-c2.yaml
index dd9e958940f..417a209edf3 100644
--- a/ssl/c2/sliver-c2.yaml
+++ b/ssl/c2/sliver-c2.yaml
@@ -7,7 +7,7 @@ info:
description: |
Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server
reference:
- https://malpedia.caad.fkie.fraunhofer.de/details/win.sliver
+ - https://malpedia.caad.fkie.fraunhofer.de/details/win.sliver
metadata:
verified: "true"
max-request: 1
diff --git a/workflows/worksite-takeover-workflow.yaml b/workflows/worksite-takeover-workflow.yaml
index be1de188630..5b06433acc7 100644
--- a/workflows/worksite-takeover-workflow.yaml
+++ b/workflows/worksite-takeover-workflow.yaml
@@ -5,7 +5,8 @@ info:
author: pdteam
description: A simple workflow that runs DNS based detection to filter hosts running Worksite and do further HTTP based check to confirm takeover.
reference:
- - https://blog.melbadry9.xyz/dangling-dns/xyz-services/ddns-worksites
+ - https://melbadry9.gitbook.io/blog/dangling-dns/xyz-services/ddns-worksites
+
workflows:
- template: dns/worksites-detection.yaml
subtemplates: