From 6381da333cee3d2fafc5594a058137374a121731 Mon Sep 17 00:00:00 2001 From: bohops Date: Thu, 4 Oct 2018 10:08:21 -0400 Subject: [PATCH] Added Acknowledgement --- yml/OSScripts/Winrm.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/yml/OSScripts/Winrm.yml b/yml/OSScripts/Winrm.yml index 577be3e..1b6a034 100644 --- a/yml/OSScripts/Winrm.yml +++ b/yml/OSScripts/Winrm.yml @@ -53,6 +53,8 @@ Resources: - Link: https://posts.specterops.io/application-whitelisting-bypass-and-arbitrary-unsigned-code-execution-technique-in-winrm-vbs-c8c24fb40404 - Link: https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf Acknowledgement: + - Person: Matt Graeber + Handle: '@mattifestation' - Person: Matt Nelson Handle: '@enigma0x3' - Person: Casey Smith