-
Hi,
I was trying to follow the installation steps given to reproduce the APT 29 attack.
I'm currently on a MacOS BigSur version 11.2.1
and running a zsh shell, although that shouldn't be a proble…
-
Good idea from Jon to track the version number on each individual plan, we can also make a separate change log file for each adversary
-
It appears that the executors defined in the emulation library aren't all being imported, and the second listed (pwsh) is getting done instead of both psh and pwsh. For example coming from apt29 yaml …
-
I've attached the datasets.py file from the python2 package on pypi. Line 83 and 84 appear to be different than what is in git. There is a print statement that dumps the cached data to screen followed…
-
VERSION-SEC564-21-1.txt below and screenshot of output
`# bitfit 1.1.3 output generated on 2020-12-29 10:05:05.374000 by jorge
# C:\Users\jorge\OneDrive\Documents\Dropbox\SANS\SEC564\Admin\bitfi…
-
I was reading line by line and I found this also:
Ransomeware
* https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/master/fin6/Emulation_Plan/FIN6.yaml#L949
* …
-
Tested on Ubuntu 18.04.3 LTS
Scenario:
As described in the install_day1_tools.sh (https://github.com/mitre-attack/attack-arsenal/blob/master/adversary_emulation/APT29/Emulation_Plan/Day%201/instal…
-
https://github.com/center-for-threat-informed-defense/adversary_emulation_library/blob/c0591fd79dae9e91bfe6323e7007a350936d0b9b/fin6/Emulation_Plan/FIN6.yaml#L631-L634
Line 632 and Line 634 use the…
-
FIN6 Template: https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/fin6
* Open an issue in https://github.com/OTRF/SimuLand
* Start collaboration with con…
-
Hi,
I found 10 occurrences of `{else 1}` in FIN6.yaml (in lines 43, 90, ...). Not much of an impact, but I think those should be `{exit 1}`.
https://github.com/center-for-threat-informed-defense/…