forked from p15670423/monkey
Added hash parsing to the T1021 remote services attack technique.
This commit is contained in:
parent
6a1bc4ba96
commit
9b23be44ed
|
@ -22,18 +22,14 @@ class T1021(AttackTechnique):
|
|||
'attempt_cnt': {'$size': '$data.attempts'},
|
||||
'attempts': {'$filter': {'input': '$data.attempts',
|
||||
'as': 'attempt',
|
||||
'cond': {'$and': [{'$eq': ['$$attempt.result', True]},
|
||||
{'$or': [{'$ne': ['$$attempt.password', '']},
|
||||
{'$ne': ['$$attempt.ssh_key', '']}]}]
|
||||
}
|
||||
'cond': {'$eq': ['$$attempt.result', True]}
|
||||
}
|
||||
}
|
||||
}
|
||||
}]
|
||||
|
||||
scanned_query = {'telem_category': 'exploit',
|
||||
'data.attempts': {'$elemMatch': {'$or': [{'password': {'$ne': ''}},
|
||||
{'ssh_key': {'$ne': ''}}]}}}
|
||||
'data.attempts': {'$elemMatch': {'result': True}}}
|
||||
|
||||
@staticmethod
|
||||
def get_report_data():
|
||||
|
|
Loading…
Reference in New Issue