Skip to content

Commit cea6917

Browse files
authored
Updating technique references for Unit42 VM Attack Path article. (#539)
1 parent 73d3d89 commit cea6917

6 files changed

+6
-0
lines changed

docs/attack-techniques/AWS/aws.execution.ec2-user-data.md

+1
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ References:
2424

2525
- https://hackingthe.cloud/aws/exploitation/local-priv-esc-mod-instance-att/
2626
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/user-data.html
27+
- https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/
2728

2829
<span style="font-variant: small-caps;">Warm-up</span>:
2930

docs/attack-techniques/AWS/aws.execution.ssm-send-command.md

+1
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ References:
3333
- https://www.chrisfarris.com/post/aws-ir/
3434
- https://www.invictus-ir.com/news/aws-cloudtrail-cheat-sheet
3535
- https://securitycafe.ro/2023/01/17/aws-post-explitation-with-ssm-sendcommand/
36+
- https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/
3637

3738

3839
## Instructions

docs/attack-techniques/AWS/aws.execution.ssm-start-session.md

+1
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ References:
3232
- https://awstip.com/responding-to-an-attack-in-aws-9048a1a551ac (evidence of usage in the wild)
3333
- https://hackingthe.cloud/aws/post_exploitation/run_shell_commands_on_ec2/#session-manager
3434
- https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques/
35+
- https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/
3536

3637

3738
## Instructions

docs/attack-techniques/AWS/aws.lateral-movement.ec2-instance-connect.md

+1
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ References:
3333
- https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-ecs-crypto-mining/#hands-on-keyboard-activity-begins
3434
- https://sysdig.com/blog/2023-global-cloud-threat-report/
3535
- https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques/
36+
- https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/
3637

3738

3839
## Instructions

docs/attack-techniques/azure/azure.execution.vm-custom-script-extension.md

+1
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ References:
2323

2424
- https://docs.microsoft.com/en-us/azure/virtual-machines/extensions/custom-script-windows
2525
- https://microsoft.github.io/Azure-Threat-Research-Matrix/Execution/AZT301/AZT301-2/
26+
- https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/
2627

2728
<span style="font-variant: small-caps;">Warm-up</span>:
2829

docs/attack-techniques/azure/azure.execution.vm-run-command.md

+1
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ References:
2828
- https://docs.microsoft.com/en-us/azure/virtual-machines/linux/run-command
2929
- https://microsoft.github.io/Azure-Threat-Research-Matrix/Execution/AZT301/AZT301-1/
3030
- https://go.crowdstrike.com/rs/281-OBQ-266/images/report-crowdstrike-2023-threat-hunting-report.pdf (page 34)
31+
- https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/
3132

3233
<span style="font-variant: small-caps;">Warm-up</span>:
3334

0 commit comments

Comments
 (0)