Skip to content

Commit 7b414f7

Browse files
author
edoardo
committed
Fixed broken links
1 parent cefdc95 commit 7b414f7

File tree

7 files changed

+32
-32
lines changed

7 files changed

+32
-32
lines changed

CONTRIBUTING.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
When contributing to this repository, please first discuss the change you wish to make via issue,
44
email, or any other method with the owners of this repository before making a change.
55

6-
Please note we have a [code of conduct](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/CODE_OF_CONDUCT.md), please follow it in all your interactions with the project.
6+
Please note we have a [code of conduct](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/CODE_OF_CONDUCT.md), please follow it in all your interactions with the project.
77

88
## Pull Request Process
99

dashboards/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ Uploading dashboards in Azure sentinel is quick and easy. The following steps mu
55

66
1. Sign into your [Azure portal](https://portal.azure.com)
77
2. Head to the Dashboards blade
8-
3. Download the [ATT&CK telemetry dashboard](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/dashboards/ATT%26CK%20telemetry.json) provided
8+
3. Download the [ATT&CK telemetry dashboard](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/dashboards/ATT%26CK%20telemetry.json) provided
99
4. Click the **Upload** button on the toolbar located at the top of the webpage
1010

1111
See the GIF below for a full demonstration:
1212

13-
![demo](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/upload-dashboard.gif)
13+
![demo](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/upload-dashboard.gif)
1414

15-
Next, if needed, you should [Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/detections/README.md).
15+
Next, if needed, you should [Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/detections/README.md).

detections/README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ This folder contains 119 Kusto queries than can be used to:
88

99
In aggregate the queries cover a total of 156 ATT&CK techniques:
1010

11-
![coverage](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/sentinel_attack_coverage.JPG)
11+
![coverage](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/sentinel_attack_coverage.JPG)
1212

1313
**DISCLAIMER:** Please note that this folder is work in progress and is constantly being updated. It is likely you will come across detections that might require some fine tuning to function 100%. If you spot any issues in the Kusto source code feel free to open an issue or submit a pull request.
1414

@@ -30,15 +30,15 @@ Each detection rule provides the following information in the rule comments:
3030

3131
Creating detection rules in Azure sentinel is done like so:
3232

33-
![demo1](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/upload-detection-rules.gif)
33+
![demo1](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/upload-detection-rules.gif)
3434

3535
### Execute hunts for specific ATT&CK techniques
3636

3737
The detection rules in this folder can also be used to conduct one-off threat hunts to try and discover specific ATT&CK techniques executed on a network, like so:
3838

39-
![demo2](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/execute-hunts.gif)
39+
![demo2](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/execute-hunts.gif)
4040

41-
Next, if needed, you could [Upload available threat hunting Jupyter notebooks in your Sentinel Azure workspace](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/hunting/README.md).
41+
Next, if needed, you could [Upload available threat hunting Jupyter notebooks in your Sentinel Azure workspace](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/hunting/README.md).
4242

4343
### ATT&CK coverage report
44-
ATT&CK coverage reports for the detection rules in this folder are available in [SVG](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/sentinel_attack_coverage.svg), [Excel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/sentinel_attack_coverage.xlsx) and [ATT&CK navigator](https://mitre-attack.github.io/attack-navigator/enterprise/) [JSON format](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/sentinel_attack_coverage.json).
44+
ATT&CK coverage reports for the detection rules in this folder are available in [SVG](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/sentinel_attack_coverage.svg), [Excel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/sentinel_attack_coverage.xlsx) and [ATT&CK navigator](https://mitre-attack.github.io/attack-navigator/enterprise/) [JSON format](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/sentinel_attack_coverage.json).

guides/Sysmon-onboarding-quickstart.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -5,29 +5,29 @@ This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel.
55

66
- **Step 1: Provision a Windows 10 virtual machine (or machines) in your [Azure environment](https://portal.azure.com).**
77

8-
You can follow microsoft's official documentation or use the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab) to quickly provision a lab. If you use the terraform script create a variables.tfvars file in the root directory, using the [variables.tfvars.txt](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
8+
You can follow microsoft's official documentation or use the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab) to quickly provision a lab. If you use the terraform script create a variables.tfvars file in the root directory, using the [variables.tfvars.txt](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
99

1010
- **Step 2: Provision a log analytics workspace**
1111

1212
The second step is to provision a log analytics workspace into which an Azure Sentinel will be deployed
1313

14-
![demo1](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/deploy-analytics.gif)
14+
![demo1](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/deploy-analytics.gif)
1515

1616

1717
- **Step 3: Deploy an Azure Sentinel instance**
1818

1919
The third step is to deploy the Azure Sentinel SIEM instance
2020

21-
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/docs/deploy-sentinel.gif)
21+
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/docs/deploy-sentinel.gif)
2222

2323
- **Step 4: Install Sysmon and load the provided sysmon configuration file on virtual machines**
2424

25-
**NOTE:** If during step 1 you have deployed your lab using the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab) you can skip this step.
25+
**NOTE:** If during step 1 you have deployed your lab using the included terraform [deployment script](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab) you can skip this step.
2626

2727
In order for the virtual machines in your lab/network to send the correct data to Sentinel you must:
2828

2929
1. Install Sysmon on the virtual machines to monitor; to do so follow the [official documentation](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon)
30-
2. Download the provided [sysmon configuration file](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/sysmonconfig.xml) on the virtual machines to monitor
30+
2. Download the provided [sysmon configuration file](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/sysmonconfig.xml) on the virtual machines to monitor
3131
3. Load the conguration file by executing the following command within the directory containing _sysmonconfig.xml_ :
3232

3333
´´´
@@ -38,7 +38,7 @@ This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel.
3838

3939
The fifth step is to enable the collection of security events
4040

41-
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/docs/enable-security-events.gif)
41+
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/docs/enable-security-events.gif)
4242

4343
- **Step 6: Activate windows event logs as data sources**
4444

@@ -50,14 +50,14 @@ This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel.
5050

5151
**Note that _Microsoft-Windows-Sysmon/Operational_ does not appear in the drop down menu. You must hit enter after inputting the data source to add it to the list**
5252

53-
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/docs/enable-event-logs.gif)
53+
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/docs/enable-event-logs.gif)
5454

5555

5656
- **Step 7: Connect Virtual Machine(s) to Sentinel**
5757

5858
The seventh step is to connect the virtual machine to Sentinel to being collecting sysmon data
5959

60-
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/docs/connect-vm.gif)
60+
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/docs/connect-vm.gif)
6161

6262

6363
- **Step 8: Check Sysmon data transmission**
@@ -68,12 +68,12 @@ This is a quick, super terse guide to onboarding Sysmon data to Azure Sentinel.
6868

6969
**Note that at this stage raw, unparsed data is being sent to sentinel**
7070

71-
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/docs/data-test.gif)
71+
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/docs/data-test.gif)
7272

7373
- **Step 9: Install Sysmon event parser**
7474

7575
The final step is to install the windows event parser to ensure Sysmon events are stored and parsed according to the [OSSEM standard](https://github.com/Cyb3rWard0g/OSSEM) and to allow for compatibility with the repository's [detection rules](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/detections).
7676

77-
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/defcon/docs/install-parser.gif)
77+
![View demo](https://github.com/BlueTeamToolkit/sentinel-attack/tree/master/docs/install-parser.gif)
7878

79-
Next, you should [Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/dashboards/README.md).
79+
Next, you should [Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/dashboards/README.md).

guides/getting-started.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@ Getting started guide
22
=====
33
Setting up Sentinel ATT&CK on Azure is quick and simple, the following steps must be performed:
44

5-
1. [Quickly spin-up a test lab on Azure Sentinel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab/README.md) **(Optional)**
6-
2. [Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/guides/Sysmon-onboarding-quickstart.md)
7-
3. [Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/dashboards/README.md)
8-
4. [Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/detections/README.md) **(Optional)**
9-
5. [Upload available threat hunting Jupyter notebooks in Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/hunting/README.md) **(Optional)**
5+
1. [Quickly spin-up a test lab on Azure Sentinel](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab/README.md) **(Optional)**
6+
2. [Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/guides/Sysmon-onboarding-quickstart.md)
7+
3. [Install the ATT&CK telemetry dashboard on Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/dashboards/README.md)
8+
4. [Upload selected Kusto queries into Sentinel analytics](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/detections/README.md) **(Optional)**
9+
5. [Upload available threat hunting Jupyter notebooks in Azure](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/hunting/README.md) **(Optional)**
1010

1111
Please note that this documentation is under active development and will be updated frequently.

hunting/README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -12,23 +12,23 @@ This folder contains a Jupyter notebook to help with process investigations and
1212

1313
a) gaining a high-level overview of ATT&CK tactics executed within a network and mapped against the [killchain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html):
1414

15-
![demo1](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/killchain-overview.png)
15+
![demo1](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/killchain-overview.png)
1616

1717
b) generating a summary of ATT&CK techniques executed on a machine:
1818

19-
![demo2](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/technique-overview.png)
19+
![demo2](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/technique-overview.png)
2020

2121
c) inspecting individual ATT&CK techniques to extract and examine processes (by event ID) executed by attackers:
2222

23-
![demo3](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/process-overview.png)
23+
![demo3](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/process-overview.png)
2424

2525
## Installation
2626

2727
Installing this notebook is quick and easy, to do so you must follow the steps outlined in the GIF below:
2828

29-
![demo4](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/docs/upload-notebook.gif)
29+
![demo4](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/docs/upload-notebook.gif)
3030

31-
You must also ensure to upload the [config.ini](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/hunting/config.ini) file provided and to complete all relevant credentials.
31+
You must also ensure to upload the [config.ini](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/hunting/config.ini) file provided and to complete all relevant credentials.
3232

3333
## Caveats
3434

lab/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ This terraform script provisions a win 10 machine and runs a post-deployment scr
44

55
# Set-up
66
1. Install/configure/authenticate Terraform following [these Microsoft docs](https://docs.microsoft.com/en-us/azure/virtual-machines/linux/terraform-install-configure).
7-
2. Create a _variables.tfvars_ file in the root directory, using the [_variables.tfvars.txt_](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
7+
2. Create a _variables.tfvars_ file in the root directory, using the [_variables.tfvars.txt_](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/lab/variables.tfvars.txt) file as a template and making sure to complete all fields.
88

99
**The _variables.tfvars_ file is the heart of the terraform playbook** and it allows:
1010
- To securely specify authentication credentials (the file is ignored by git)
@@ -20,4 +20,4 @@ This terraform script provisions a win 10 machine and runs a post-deployment scr
2020

2121
```terraform apply --var-file="variables.tfvars"```
2222

23-
As a next step you should [Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/defcon/guides/Sysmon-onboarding-quickstart.md).
23+
As a next step you should [Deploy Sentinel and onboard Sysmon data](https://github.com/BlueTeamToolkit/sentinel-attack/blob/master/guides/Sysmon-onboarding-quickstart.md).

0 commit comments

Comments
 (0)