Open cudeso opened 2 months ago
Inject 2 ("IP Address") for https://github.com/MISP/SkillAegis/blob/main/scenarios/scam-call-encoding.json
Same happens when adding the SHA1. The IDS field was set on submission.
{
"Attribute.type": "sha1",
"Attribute.distribution": "5",
"Attribute.sharing_group_id": "4",
"Attribute.value": "04d496d39bc9409bfdabdeb07002b97093b58f77",
"Attribute.batch_import": "0",
"Attribute.to_ids": [
"0",
"1"
],
"Attribute.disable_correlation": "0"
}
Hey. It looks like it's a MISP thing rather than SkillAegis. I could be coming from the way cakephp parses the urlencoded form when using paranoid mode.
After this, the inject is not considered as successfully done by the player. But that shouldn't have a big impact on the scenario since the event is fully fetched by SA.
That being said, this scenario has many issues. It will receive an update soon to be more lax and flexible.
When I add an attribute "194.78.89.250" to an event, the ZMQ output is
In the SkillAegis Dashboard the payload is displayed as:
After this, the inject is not considered as successfully done by the player.
Could this be because of "Attribute.to_ids" having both "0" and "1" in the payload?
MISP version 2.4.194