attack-evals icon indicating copy to clipboard operation
attack-evals copied to clipboard

ATT&CK Evaluations website (DEPRECATED)

Results 9 attack-evals issues
Sort by recently updated
recently updated
newest added

Pl. give me permission for contributing to this project.

I got an error message

The link to SANS presentation - Do-It-Yourself ATT&CK Evaluations to Improve Your Security Posture Presentation - needs to be updated. ![image](https://user-images.githubusercontent.com/4639200/107920441-fe763480-6f92-11eb-8ce7-79e057e9b1ec.png) Old url (404): https://www.sans.org/cyber-security-summit/archives/file/summit_archive_1559672321.pdf The new url is (SANS...

The following link for the results of your testing gets a HTTP 404 error when clicked: https://attackevals.mitre.org/evaluations.html?round=APT29 The link is provided by MITRE on this page: https://www.mitre.org/news/press-releases/mitre-releases-results-of-evaluations-of-21-cybersecurity-products

Looks like the link is broken - ATT&CK Evaluations Adversary Emulation Summary https://attackevals.mitre.org/methodology/ ![image](https://user-images.githubusercontent.com/4639200/107919781-db975080-6f91-11eb-8bed-68c2e2ad2b70.png)

The CALDERA plugin: Eval - Full Round 1 Environment page linked from [here](https://github.com/mitre-attack/evals_caldera) does not exist at this [URL](https://attackevals.mitre.org/methodology/round1/environment.html).

-[00000000:0:0]plg.trace.generic.EndPoint -[00000000:1:0]plg.trace.generic.ArpCache -[00010000:2:0]plg.trace.generic.VendorByMac -[00010000:2:1]plg.trace.generic.TcpPort -[00030001:3:0]plg.trace.generic.HttpService -[00060001:4:0]plg.trace.generic.HnapService -[00060001:4:1]plg.trace.netgear.SoapService -[00060001:4:2]plg.probe.allegro.MisfortuneCookie -[00060001:4:3]plg.probe.allegro.Rom0Disclosure -[00060001:4:4]plg.probe.mikrotik.ChimayRed -[00060001:4:5]plg.probe.seagate.NasPhpInjection -[00060001:4:6]plg.probe.cisco.LinksysESeriesRce -[00060001:4:7]plg.trace.qnap.AuthLoginCgi -[000A0008:5:0]plg.probe.qnap.PhotoStationLfi -[000A0008:5:1]plg.probe.qnap.SurvStationSbo -[00060001:4:8]plg.probe.tplink.TdpServerRce -[00060001:4:9]plg.trace.terramaster.TosByVersion -[000A000A:5:0]plg.probe.terramaster.TosMultiVulnLt4206 -[00060001:4:10]plg.trace.netgear.CurrentSettingHtm -[000A000B:5:0]plg.probe.netgear.StackOverflowByVer -[000A000B:5:1]plg.probe.netgear.R7000PreAuthRceByVer -[00060001:4:11]plg.probe.netgear.Dgn2200v1AuthByPass -[00060001:4:12]plg.probe.wd.MyBookLiveByVer -[00060001:4:13]plg.probe.tplink.ReUserAgentRce -[00060001:4:14]plg.probe.generic.HttpPathTrav -[00060001:4:15]plg.trace.binatone.HubbleConnected -[00060001:4:16]plg.probe.dlink.Dap2020HwAxFwLt101Multi -[00060001:4:17]plg.trace.dahua.Rpc2Login -[000A0012:5:0]plg.probe.dahua.Rpc2LoginBypass -[00030001:3:1]plg.trace.generic.SmbService...

Just curious if anyone can help me read the following file please much thanks in advance all of your help is appreciated greatly

https://github.com/IAMLegEndIAM/HOLY.GRAIL.DATING.INFO/releases/tag/KRIST