Skip to content

Commit

Permalink
- Removing unnecessary chars
Browse files Browse the repository at this point in the history
  • Loading branch information
shivaccuknox committed Apr 25, 2024
1 parent 8da708c commit 6e95ac7
Show file tree
Hide file tree
Showing 16 changed files with 205 additions and 205 deletions.
30 changes: 15 additions & 15 deletions tactic-TA0001.html
Original file line number Diff line number Diff line change
Expand Up @@ -8,119 +8,119 @@ <h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0001">Initial Access</a></

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1199.501">MNO Roaming Partners</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5011">Unauthorized access to Network Exposure Function (NEF) via token fraud</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195">Supply Chain Compromise</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.004">Cloud Accounts</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.501">SIM Credential Theft</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1572">Protocol Tunneling</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1190">Exploit Public-Facing Application</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.502">Compromise Service Supply Chain</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5029">Exploit Semi-public Facing Application</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1572.501">UE Access via GTP-U</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5034">Radio control manipulation via rogue xApps</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.002">Compromise Software Supply Chain</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1195.003">Compromise Hardware Supply Chain</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1199">Trusted Relationship</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078">Valid Accounts</a></td>
<td>no
<td>
&#x1F534

</td>
Expand Down
18 changes: 9 additions & 9 deletions tactic-TA0002.html
Original file line number Diff line number Diff line change
Expand Up @@ -8,71 +8,71 @@ <h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0002">Execution</a></h1>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5007">Registration of malicious network functions</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1072">Software Deployment Tools</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032">gNodeB Component Manipulation</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032.001">RAN Intelligent Controller (RIC)</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032.002">xApp</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT5032.003">rApp</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1203.501">Over-the-Air Input</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1203.502">Baseband API</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1203">Exploitation for Client Execution</a></td>
<td>no
<td>
&#x1F534

</td>
Expand Down
12 changes: 6 additions & 6 deletions tactic-TA0003.html
Original file line number Diff line number Diff line change
Expand Up @@ -8,47 +8,47 @@ <h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0003">Persistence</a></h1>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1525">Implant Internal Image</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.003">Local Accounts</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1542.501">Unauthorized software in NFVI</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.004">Cloud Accounts</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078">Valid Accounts</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1542">Pre-OS Boot</a></td>
<td>no
<td>
&#x1F534

</td>
Expand Down
8 changes: 4 additions & 4 deletions tactic-TA0004.html
Original file line number Diff line number Diff line change
Expand Up @@ -8,31 +8,31 @@ <h1>Tactic:<a href="https://fight.mitre.org/tactics/TA0004">Privilege Escalation

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1611">Escape to Host</a></td>
<td>yes
<td>
&#x1F7E2

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078.004">Cloud Accounts</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1611.501">Malicious privileged container VNF Shared Resource Access</a></td>
<td>no
<td>
&#x1F534

</td>
</tr>

<tr>
<td><a href="https://fight.mitre.org/techniques/FGT1078">Valid Accounts</a></td>
<td>no
<td>
&#x1F534

</td>
Expand Down
Loading

0 comments on commit 6e95ac7

Please sign in to comment.