Add support for MITRE ATT&CK
This commit is contained in:
@@ -1,6 +1,7 @@
|
||||
#import "@preview/diagraph:0.3.6"
|
||||
|
||||
#import "../addons/cvss.typ"
|
||||
#import "../addons/mitre.typ"
|
||||
|
||||
#let render(target: str, targetInSentence: str, testFocus: str, testObject: str, testScenario: str, recommendation: str, start: str, end: str, setup: str, nodes: raw, scope: array) = {
|
||||
[
|
||||
@@ -18,7 +19,14 @@
|
||||
|
||||
== Test Methodology
|
||||
|
||||
The aim of the test was to uncover vulnerabilities and weaknesses of all kinds and chaining findings and vulnerabilities accordingly to gain a deep understanding of the audited hosts, following a security-in-depth approach. The tests were carried out in accordance with the MITRE ATT&CK Framework#footnote("https://attack.mitre.org").
|
||||
The aim of the test was to uncover vulnerabilities and weaknesses of all kinds and chaining findings and vulnerabilities accordingly to gain a deep understanding of the audited hosts, following a security-in-depth approach. #context([
|
||||
#let methods = (
|
||||
if mitre.isUsed.final() { [the MITRE ATT&CK Framework#footnote("https://attack.mitre.org")] },
|
||||
).filter(m => m != none)
|
||||
#if methods.len() > 0 {
|
||||
[The tests were carried out in accordance with #methods.join(", ", last: ", and ").]
|
||||
}
|
||||
])
|
||||
|
||||
The penetration test was performed as a #testScenario.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user