Closed AlbinoGazelle closed 3 days ago
@AlbinoGazelle - Thanks for reaching out. Let's capture it and make a note to state that the actual command run by the TA is not available via CTI reporting and the example provided is via vendor doco. Are you able to add this ?
Should we only include examples that have direct proof of being used by adversaries? In Mandiant's blog post here: https://cloud.google.com/blog/topics/threat-intelligence/vmware-detection-containment-hardening they note the default behavior of the ESXi firewall is to drop packets but a threat actor could leverage
esxcli
to set the default behavior to pass packets, essentially disabling the firewall. Seenetwork firewall set
command here: https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_network.htmlI'd like to include this in the project, let me know if that makes sense!