Skip to content

Commit cc6aaad

Browse files
authored
[docs] Display MITRE ATT&CK tactics in appropriate order (closes #658) (#659)
* [docs] Display MITRE ATT&CK tactics in appropriate order (closes #658) * Remove extraneous whitespace
1 parent d33e734 commit cc6aaad

File tree

9 files changed

+226
-210
lines changed

9 files changed

+226
-210
lines changed

docs/attack-techniques/AWS/index.md

+112-112
Original file line numberDiff line numberDiff line change
@@ -4,128 +4,128 @@ This page contains the Stratus attack techniques for AWS, grouped by MITRE ATT&C
44
Note that some Stratus attack techniques may correspond to more than a single ATT&CK Tactic.
55

66

7-
## Credential Access
8-
9-
- [Retrieve EC2 Password Data](./aws.credential-access.ec2-get-password-data.md)
10-
11-
- [Steal EC2 Instance Credentials](./aws.credential-access.ec2-steal-instance-credentials.md)
12-
13-
- [Retrieve a High Number of Secrets Manager secrets (Batch)](./aws.credential-access.secretsmanager-batch-retrieve-secrets.md)
7+
## Initial Access
8+
9+
- [Console Login without MFA](./aws.initial-access.console-login-without-mfa.md)
10+
1411

15-
- [Retrieve a High Number of Secrets Manager secrets](./aws.credential-access.secretsmanager-retrieve-secrets.md)
12+
## Execution
13+
14+
- [Launch Unusual EC2 instances](./aws.execution.ec2-launch-unusual-instances.md)
15+
16+
- [Execute Commands on EC2 Instance via User Data](./aws.execution.ec2-user-data.md)
17+
18+
- [Usage of ssm:SendCommand on multiple instances](./aws.execution.ssm-send-command.md)
19+
20+
- [Usage of ssm:StartSession on multiple instances](./aws.execution.ssm-start-session.md)
21+
1622

17-
- [Retrieve And Decrypt SSM Parameters](./aws.credential-access.ssm-retrieve-securestring-parameters.md)
23+
## Persistence
24+
25+
- [Backdoor an IAM Role](./aws.persistence.iam-backdoor-role.md)
26+
27+
- [Create an Access Key on an IAM User](./aws.persistence.iam-backdoor-user.md)
28+
29+
- [Create an administrative IAM User](./aws.persistence.iam-create-admin-user.md)
30+
31+
- [Create a backdoored IAM Role](./aws.persistence.iam-create-backdoor-role.md)
32+
33+
- [Create a Login Profile on an IAM User](./aws.persistence.iam-create-user-login-profile.md)
34+
35+
- [Backdoor Lambda Function Through Resource-Based Policy](./aws.persistence.lambda-backdoor-function.md)
36+
37+
- [Add a Malicious Lambda Extension](./aws.persistence.lambda-layer-extension.md)
38+
39+
- [Overwrite Lambda Function Code](./aws.persistence.lambda-overwrite-code.md)
40+
41+
- [Create an IAM Roles Anywhere trust anchor](./aws.persistence.rolesanywhere-create-trust-anchor.md)
42+
43+
- [Generate temporary AWS credentials using GetFederationToken](./aws.persistence.sts-federation-token.md)
44+
1845

46+
## Privilege Escalation
47+
48+
- [Execute Commands on EC2 Instance via User Data](./aws.execution.ec2-user-data.md)
49+
50+
- [Create an Access Key on an IAM User](./aws.persistence.iam-backdoor-user.md)
51+
52+
- [Create an administrative IAM User](./aws.persistence.iam-create-admin-user.md)
53+
54+
- [Create a Login Profile on an IAM User](./aws.persistence.iam-create-user-login-profile.md)
55+
56+
- [Add a Malicious Lambda Extension](./aws.persistence.lambda-layer-extension.md)
57+
58+
- [Create an IAM Roles Anywhere trust anchor](./aws.persistence.rolesanywhere-create-trust-anchor.md)
59+
60+
- [Change IAM user password](./aws.privilege-escalation.iam-update-user-login-profile.md)
61+
1962

2063
## Defense Evasion
64+
65+
- [Delete CloudTrail Trail](./aws.defense-evasion.cloudtrail-delete.md)
66+
67+
- [Disable CloudTrail Logging Through Event Selectors](./aws.defense-evasion.cloudtrail-event-selectors.md)
68+
69+
- [CloudTrail Logs Impairment Through S3 Lifecycle Rule](./aws.defense-evasion.cloudtrail-lifecycle-rule.md)
70+
71+
- [Stop CloudTrail Trail](./aws.defense-evasion.cloudtrail-stop.md)
72+
73+
- [Delete DNS query logs](./aws.defense-evasion.dns-delete-logs.md)
74+
75+
- [Attempt to Leave the AWS Organization](./aws.defense-evasion.organizations-leave.md)
76+
77+
- [Remove VPC Flow Logs](./aws.defense-evasion.vpc-remove-flow-logs.md)
78+
2179

22-
- [Delete CloudTrail Trail](./aws.defense-evasion.cloudtrail-delete.md)
23-
24-
- [Disable CloudTrail Logging Through Event Selectors](./aws.defense-evasion.cloudtrail-event-selectors.md)
25-
26-
- [CloudTrail Logs Impairment Through S3 Lifecycle Rule](./aws.defense-evasion.cloudtrail-lifecycle-rule.md)
27-
28-
- [Stop CloudTrail Trail](./aws.defense-evasion.cloudtrail-stop.md)
29-
30-
- [Delete DNS query logs](./aws.defense-evasion.dns-delete-logs.md)
31-
32-
- [Attempt to Leave the AWS Organization](./aws.defense-evasion.organizations-leave.md)
33-
34-
- [Remove VPC Flow Logs](./aws.defense-evasion.vpc-remove-flow-logs.md)
35-
80+
## Credential Access
81+
82+
- [Retrieve EC2 Password Data](./aws.credential-access.ec2-get-password-data.md)
83+
84+
- [Steal EC2 Instance Credentials](./aws.credential-access.ec2-steal-instance-credentials.md)
85+
86+
- [Retrieve a High Number of Secrets Manager secrets (Batch)](./aws.credential-access.secretsmanager-batch-retrieve-secrets.md)
87+
88+
- [Retrieve a High Number of Secrets Manager secrets](./aws.credential-access.secretsmanager-retrieve-secrets.md)
89+
90+
- [Retrieve And Decrypt SSM Parameters](./aws.credential-access.ssm-retrieve-securestring-parameters.md)
91+
3692

3793
## Discovery
94+
95+
- [Execute Discovery Commands on an EC2 Instance](./aws.discovery.ec2-enumerate-from-instance.md)
96+
97+
- [Download EC2 Instance User Data](./aws.discovery.ec2-download-user-data.md)
98+
99+
- [Enumerate SES](./aws.discovery.ses-enumerate.md)
100+
38101

39-
- [Execute Discovery Commands on an EC2 Instance](./aws.discovery.ec2-enumerate-from-instance.md)
40-
41-
- [Download EC2 Instance User Data](./aws.discovery.ec2-download-user-data.md)
42-
43-
- [Enumerate SES](./aws.discovery.ses-enumerate.md)
44-
45-
46-
## Execution
47-
48-
- [Launch Unusual EC2 instances](./aws.execution.ec2-launch-unusual-instances.md)
49-
50-
- [Execute Commands on EC2 Instance via User Data](./aws.execution.ec2-user-data.md)
51-
52-
- [Usage of ssm:SendCommand on multiple instances](./aws.execution.ssm-send-command.md)
53-
54-
- [Usage of ssm:StartSession on multiple instances](./aws.execution.ssm-start-session.md)
55-
102+
## Lateral Movement
103+
104+
- [Usage of EC2 Serial Console to push SSH public key](./aws.lateral-movement.ec2-serial-console-send-ssh-public-key.md)
105+
106+
- [Usage of EC2 Instance Connect on multiple instances](./aws.lateral-movement.ec2-instance-connect.md)
107+
56108

57109
## Exfiltration
58-
59-
- [Open Ingress Port 22 on a Security Group](./aws.exfiltration.ec2-security-group-open-port-22-ingress.md)
60-
61-
- [Exfiltrate an AMI by Sharing It](./aws.exfiltration.ec2-share-ami.md)
62-
63-
- [Exfiltrate EBS Snapshot by Sharing It](./aws.exfiltration.ec2-share-ebs-snapshot.md)
64-
65-
- [Exfiltrate RDS Snapshot by Sharing](./aws.exfiltration.rds-share-snapshot.md)
66-
67-
- [Backdoor an S3 Bucket via its Bucket Policy](./aws.exfiltration.s3-backdoor-bucket-policy.md)
68-
110+
111+
- [Open Ingress Port 22 on a Security Group](./aws.exfiltration.ec2-security-group-open-port-22-ingress.md)
112+
113+
- [Exfiltrate an AMI by Sharing It](./aws.exfiltration.ec2-share-ami.md)
114+
115+
- [Exfiltrate EBS Snapshot by Sharing It](./aws.exfiltration.ec2-share-ebs-snapshot.md)
116+
117+
- [Exfiltrate RDS Snapshot by Sharing](./aws.exfiltration.rds-share-snapshot.md)
118+
119+
- [Backdoor an S3 Bucket via its Bucket Policy](./aws.exfiltration.s3-backdoor-bucket-policy.md)
120+
69121

70122
## Impact
71-
72-
- [Invoke Bedrock Model](./aws.impact.bedrock-invoke-model.md)
73-
74-
- [S3 Ransomware through batch file deletion](./aws.impact.s3-ransomware-batch-deletion.md)
75-
76-
- [S3 Ransomware through client-side encryption](./aws.impact.s3-ransomware-client-side-encryption.md)
77-
78-
- [S3 Ransomware through individual file deletion](./aws.impact.s3-ransomware-individual-deletion.md)
79-
80-
81-
## Initial Access
82-
83-
- [Console Login without MFA](./aws.initial-access.console-login-without-mfa.md)
84-
85-
86-
## Lateral Movement
87-
88-
- [Usage of EC2 Serial Console to push SSH public key](./aws.lateral-movement.ec2-serial-console-send-ssh-public-key.md)
89-
90-
- [Usage of EC2 Instance Connect on multiple instances](./aws.lateral-movement.ec2-instance-connect.md)
91-
92-
93-
## Persistence
94-
95-
- [Backdoor an IAM Role](./aws.persistence.iam-backdoor-role.md)
96-
97-
- [Create an Access Key on an IAM User](./aws.persistence.iam-backdoor-user.md)
98-
99-
- [Create an administrative IAM User](./aws.persistence.iam-create-admin-user.md)
100-
101-
- [Create a backdoored IAM Role](./aws.persistence.iam-create-backdoor-role.md)
102-
103-
- [Create a Login Profile on an IAM User](./aws.persistence.iam-create-user-login-profile.md)
104-
105-
- [Backdoor Lambda Function Through Resource-Based Policy](./aws.persistence.lambda-backdoor-function.md)
106-
107-
- [Add a Malicious Lambda Extension](./aws.persistence.lambda-layer-extension.md)
108-
109-
- [Overwrite Lambda Function Code](./aws.persistence.lambda-overwrite-code.md)
110-
111-
- [Create an IAM Roles Anywhere trust anchor](./aws.persistence.rolesanywhere-create-trust-anchor.md)
112-
113-
- [Generate temporary AWS credentials using GetFederationToken](./aws.persistence.sts-federation-token.md)
114-
115-
116-
## Privilege Escalation
117-
118-
- [Execute Commands on EC2 Instance via User Data](./aws.execution.ec2-user-data.md)
119-
120-
- [Create an Access Key on an IAM User](./aws.persistence.iam-backdoor-user.md)
121-
122-
- [Create an administrative IAM User](./aws.persistence.iam-create-admin-user.md)
123-
124-
- [Create a Login Profile on an IAM User](./aws.persistence.iam-create-user-login-profile.md)
125-
126-
- [Add a Malicious Lambda Extension](./aws.persistence.lambda-layer-extension.md)
127-
128-
- [Create an IAM Roles Anywhere trust anchor](./aws.persistence.rolesanywhere-create-trust-anchor.md)
129-
130-
- [Change IAM user password](./aws.privilege-escalation.iam-update-user-login-profile.md)
131-
123+
124+
- [Invoke Bedrock Model](./aws.impact.bedrock-invoke-model.md)
125+
126+
- [S3 Ransomware through batch file deletion](./aws.impact.s3-ransomware-batch-deletion.md)
127+
128+
- [S3 Ransomware through client-side encryption](./aws.impact.s3-ransomware-client-side-encryption.md)
129+
130+
- [S3 Ransomware through individual file deletion](./aws.impact.s3-ransomware-individual-deletion.md)
131+

docs/attack-techniques/EKS/index.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,17 @@ This page contains the Stratus attack techniques for EKS, grouped by MITRE ATT&C
44
Note that some Stratus attack techniques may correspond to more than a single ATT&CK Tactic.
55

66

7-
## Lateral Movement
8-
9-
- [Create Admin EKS Access Entry](./eks.lateral-movement.create-access-entry.md)
10-
11-
127
## Persistence
13-
14-
- [Backdoor aws-auth EKS ConfigMap](./eks.persistence.backdoor-aws-auth-configmap.md)
15-
8+
9+
- [Backdoor aws-auth EKS ConfigMap](./eks.persistence.backdoor-aws-auth-configmap.md)
10+
1611

1712
## Privilege Escalation
13+
14+
- [Backdoor aws-auth EKS ConfigMap](./eks.persistence.backdoor-aws-auth-configmap.md)
15+
1816

19-
- [Backdoor aws-auth EKS ConfigMap](./eks.persistence.backdoor-aws-auth-configmap.md)
20-
17+
## Lateral Movement
18+
19+
- [Create Admin EKS Access Entry](./eks.lateral-movement.create-access-entry.md)
20+

docs/attack-techniques/GCP/index.md

+28-28
Original file line numberDiff line numberDiff line change
@@ -4,36 +4,36 @@ This page contains the Stratus attack techniques for GCP, grouped by MITRE ATT&C
44
Note that some Stratus attack techniques may correspond to more than a single ATT&CK Tactic.
55

66

7-
## Credential Access
8-
9-
- [Retrieve a High Number of Secret Manager secrets](./gcp.credential-access.secretmanager-retrieve-secrets.md)
10-
11-
12-
## Exfiltration
13-
14-
- [Exfiltrate Compute Disk by sharing it](./gcp.exfiltration.share-compute-disk.md)
15-
16-
- [Exfiltrate Compute Image by sharing it](./gcp.exfiltration.share-compute-image.md)
17-
18-
- [Exfiltrate Compute Disk by sharing a snapshot](./gcp.exfiltration.share-compute-snapshot.md)
19-
20-
217
## Persistence
22-
23-
- [Backdoor a GCP Service Account through its IAM Policy](./gcp.persistence.backdoor-service-account-policy.md)
24-
25-
- [Create an Admin GCP Service Account](./gcp.persistence.create-admin-service-account.md)
26-
27-
- [Create a GCP Service Account Key](./gcp.persistence.create-service-account-key.md)
28-
29-
- [Invite an External User to a GCP Project](./gcp.persistence.invite-external-user.md)
30-
8+
9+
- [Backdoor a GCP Service Account through its IAM Policy](./gcp.persistence.backdoor-service-account-policy.md)
10+
11+
- [Create an Admin GCP Service Account](./gcp.persistence.create-admin-service-account.md)
12+
13+
- [Create a GCP Service Account Key](./gcp.persistence.create-service-account-key.md)
14+
15+
- [Invite an External User to a GCP Project](./gcp.persistence.invite-external-user.md)
16+
3117

3218
## Privilege Escalation
19+
20+
- [Create an Admin GCP Service Account](./gcp.persistence.create-admin-service-account.md)
21+
22+
- [Create a GCP Service Account Key](./gcp.persistence.create-service-account-key.md)
23+
24+
- [Impersonate GCP Service Accounts](./gcp.privilege-escalation.impersonate-service-accounts.md)
25+
3326

34-
- [Create an Admin GCP Service Account](./gcp.persistence.create-admin-service-account.md)
35-
36-
- [Create a GCP Service Account Key](./gcp.persistence.create-service-account-key.md)
37-
38-
- [Impersonate GCP Service Accounts](./gcp.privilege-escalation.impersonate-service-accounts.md)
27+
## Credential Access
28+
29+
- [Retrieve a High Number of Secret Manager secrets](./gcp.credential-access.secretmanager-retrieve-secrets.md)
30+
3931

32+
## Exfiltration
33+
34+
- [Exfiltrate Compute Disk by sharing it](./gcp.exfiltration.share-compute-disk.md)
35+
36+
- [Exfiltrate Compute Image by sharing it](./gcp.exfiltration.share-compute-image.md)
37+
38+
- [Exfiltrate Compute Disk by sharing a snapshot](./gcp.exfiltration.share-compute-snapshot.md)
39+

docs/attack-techniques/azure/index.md

+12-12
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,18 @@ Note that some Stratus attack techniques may correspond to more than a single AT
55

66

77
## Execution
8-
9-
- [Execute Command on Virtual Machine using Custom Script Extension](./azure.execution.vm-custom-script-extension.md)
10-
11-
- [Execute Commands on Virtual Machine using Run Command](./azure.execution.vm-run-command.md)
12-
13-
14-
## Exfiltration
15-
16-
- [Export Disk Through SAS URL](./azure.exfiltration.disk-export.md)
17-
8+
9+
- [Execute Command on Virtual Machine using Custom Script Extension](./azure.execution.vm-custom-script-extension.md)
10+
11+
- [Execute Commands on Virtual Machine using Run Command](./azure.execution.vm-run-command.md)
12+
1813

1914
## Persistence
15+
16+
- [Create Azure VM Bastion shareable link](./azure.persistence.create-bastion-shareable-link.md)
17+
2018

21-
- [Create Azure VM Bastion shareable link](./azure.persistence.create-bastion-shareable-link.md)
22-
19+
## Exfiltration
20+
21+
- [Export Disk Through SAS URL](./azure.exfiltration.disk-export.md)
22+

0 commit comments

Comments
 (0)