From 0d83cba3bb3b9cfe02a3d2950983dba845ae64b4 Mon Sep 17 00:00:00 2001 From: Bhavin Patel Date: Wed, 3 Sep 2025 09:20:27 -0700 Subject: [PATCH] testing CI --- .../T1529/linux_sysrq_abuse/linux_sysrq_abuse.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/datasets/attack_techniques/T1529/linux_sysrq_abuse/linux_sysrq_abuse.yml b/datasets/attack_techniques/T1529/linux_sysrq_abuse/linux_sysrq_abuse.yml index 27783b22..8c4917cb 100644 --- a/datasets/attack_techniques/T1529/linux_sysrq_abuse/linux_sysrq_abuse.yml +++ b/datasets/attack_techniques/T1529/linux_sysrq_abuse/linux_sysrq_abuse.yml @@ -1,6 +1,6 @@ author: Milad Cheraghi -id: b4b1271b-4529-4f36-9edc-d70765eaa4c0 -date: '2025-08-28' +id: 7d1fc9be-c410-41d7-a69a-5c1f4bd80632 +date: '2025-09-03' description: 'Sample of Linux auditd events showing potential abuse of the Magic SysRq key to manipulate or destabilize the system.' environment: custom directory: linux_sysrq_abuse