-
Notifications
You must be signed in to change notification settings - Fork 435
the day after 8 million requests #3328
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
PR for dataset splunk/attack_data#960 |
Update references in description files as well.
|
There are a number of changes to this detection:
Which mean it will not make it into the 5.1 release. This detection should make it into the 5.2 release. Because of these changes and the need to retest, I have converted this PR back to WIP. |
Fix bad alignment of tests section
fix tests key again
pyth0n1c
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Confirmed this is ready to merge after discussions with author.
AWS S3 Bucket Security: Decommissioned Bucket Detections
Changes
Technical Details
Missing
Purpose
Helps detect bucket hijacking by tracking and detecting access to previously public S3 buckets that were decommissioned. As seen on https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/