Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Only Open Source Documented Procedures Included? #18

Closed
AlbinoGazelle opened this issue Nov 20, 2024 · 1 comment · Fixed by #20
Closed

Only Open Source Documented Procedures Included? #18

AlbinoGazelle opened this issue Nov 20, 2024 · 1 comment · Fixed by #20
Assignees

Comments

@AlbinoGazelle
Copy link
Contributor

Should we only include examples that have direct proof of being used by adversaries? In Mandiant's blog post here: https://cloud.google.com/blog/topics/threat-intelligence/vmware-detection-containment-hardening they note the default behavior of the ESXi firewall is to drop packets but a threat actor could leverage esxcli to set the default behavior to pass packets, essentially disabling the firewall. See network firewall set command here: https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_network.html

I'd like to include this in the project, let me know if that makes sense!

@blueteam0ps
Copy link
Collaborator

@AlbinoGazelle - Thanks for reaching out. Let's capture it and make a note to state that the actual command run by the TA is not available via CTI reporting and the example provided is via vendor doco. Are you able to add this ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants