Skip to content

Commit

Permalink
[Tuning] Updated references
Browse files Browse the repository at this point in the history
  • Loading branch information
Aegrah committed Sep 30, 2024
1 parent ef4e433 commit af649b9
Show file tree
Hide file tree
Showing 5 changed files with 10 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -64,6 +64,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
Expand Down
3 changes: 2 additions & 1 deletion rules/linux/execution_cupsd_foomatic_rip_file_creation.toml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -64,6 +64,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -65,6 +65,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -64,6 +64,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -65,6 +65,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
Expand Down

0 comments on commit af649b9

Please sign in to comment.