Skip to content

Commit

Permalink
fixed naming convention error
Browse files Browse the repository at this point in the history
  • Loading branch information
adpare committed Dec 19, 2023
1 parent 911c61d commit bee3732
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
6 changes: 3 additions & 3 deletions attack-theme/templates/macros/contact_card.html
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{% macro render(title, link, description, fa_icon=None, invert_icon=None, buttons=None, card_new=None, footer_description=None) %}
{% macro render(title, link, description, fa_icon=None, invert_icon=None, buttons=None, header_background=None, footer_description=None) %}
<div class="contact-card card">
{% if card_new %}
{% if header_background %}
<div class="card-header background">
<span class="contact-card-title hover-line">{{title}}</span>
&nbsp;&nbsp;
Expand Down Expand Up @@ -51,7 +51,7 @@
{% endfor %}
</div>
{% endif %}
{% if card_new %}
{% if header_background %}
<div class="card-footer card-footer-no-button">
{% if footer_description %}
{{footer_description}}
Expand Down
8 changes: 4 additions & 4 deletions modules/resources/templates/getting-started.html
Original file line number Diff line number Diff line change
Expand Up @@ -103,15 +103,15 @@ <h4><strong>How can I use ATT&amp;CK?</strong></h4>
Presents a methodology for using ATT&CK to build, test, and refine behavioral-based analytic detection capabilities. (June 2017)
<br><br><a href=\"https://www.youtube.com/watch?v=p7Hyd7d9k-c\">ATT&amp;CKing the Status Quo Presentation</a><br>
The latter part of this presentation provides an introduction to using ATT&CK to create analytics. <a href=\"https://www.slideshare.net/KatieNickels/bsideslv-2018-katie-nickels-and-john-wunder-attcking-the-status-quo\">Slides are also available</a>. (August 2018)",
fa_icon=None, invert_icon=True, buttons=None, card_new=True,footer_description="View more resources about Detections and Analytics")}}
fa_icon=None, invert_icon=True, buttons=None, header_background=True,footer_description="View more resources about Detections and Analytics here")}}
{{contact_card.render("Threat Intelligence ", "", "ATT&CK gives analysts a common language to structure, compare, and analyze threat intelligence.
<br><br><a href=\"https://medium.com/mitre-attack/getting-started-with-attack-cti-4eb205be4b2f\">Getting Started with ATT&amp;CK: Threat Intelligence Blog Post</a><br>
This blog post describes how you can get started using ATT&CK for detection and analytics at three different levels of sophistication. (June 2019)
<br><br><a href=\"https://www.slideshare.net/JamieWilliams130/attcking-your-adversaries-operationalizing-cyber-intelligence-in-your-own-environment-for-better-sleep-and-a-safer-tomorrow\">ATT&amp;CKing Your Adversaries Presentation</a><br>
This presentation covers how to use ATT&CK to take cyber threat intelligence and operationalize it into behaviors that can drive relevant detections. (August 2019)
<br><br><a href=\"https://www.mitre.org/news-insights/publication/finding-cyber-threats-attck-based-analytics\">Using ATT&CK to Advance Cyber Threat Intelligence</a><br>
This blog posts presents practical implementation tips for applying ATT&CK to cyber threat intelligence. (September 2018)",
fa_icon=None, invert_icon=True, buttons=None, card_new=True,footer_description="View more resources about Threat Intelligence")}}
fa_icon=None, invert_icon=True, buttons=None, header_background=True,footer_description="View more resources about Threat Intelligence here")}}
</div>
<br>
<div class="card-deck">
Expand All @@ -122,13 +122,13 @@ <h4><strong>How can I use ATT&amp;CK?</strong></h4>
This presentation explains how defenders can improve their security posture through the use of adversary emulation by performing their very own ATT&CK Evaluations. (June 2019)
<br><br><a href=\"https://www.x33fcon.com/slides/x33fcon19_ThreatbasedPurpleTeamming_JamieDaniel.pdf\">APT ATT&amp;CK - Threat-based Purple Teaming with ATT&amp;CK Continued Presentation</a><br>
This presentation covers how to use ATT&CK to take cyber threat intelligence and operationalize it into behaviors that can drive relevant detections. (May 2019)",
fa_icon=None, invert_icon=True, buttons=None, card_new=True,footer_description="View more resources about Adversary Emulation and Red Teaming")}}
fa_icon=None, invert_icon=True, buttons=None, header_background=True,footer_description="View more resources about Adversary Emulation and Red Teaming here")}}
{{contact_card.render("Assessment and Engineering", "", "ATT&CK can be used to assess your organization’s capabilities and drive engineering decisions like what tools or logging you should implement.
<br><br><a href=\"https://medium.com/mitre-attack/getting-started-with-attack-assessment-cc0b01769cb4\">Getting Started with ATT&amp;CK: Assessments and Engineering Blog Post</a><br>
This blog post describes how you can get started using ATT&CK for assessments and engineering at three different levels of sophistication. (August 2019)
<br><br><a href=\"https://www.youtube.com/watch?v=lMh9E8l1-ks\">Lessons Learned Applying ATT&amp;CK-Based SOC Assessments</a><br>
This keynote presentation discusses a process to gauge a SOC’s detective capabilities as they relate to ATT&CK, including MITRE’s practical experiences and lessons learned. (June 2019)",
fa_icon=None, invert_icon=True, buttons=None, card_new=True,footer_description="View more resources about Assessment and Engineering")}}
fa_icon=None, invert_icon=True, buttons=None, header_background=True,footer_description="View more resources about Assessment and Engineering here")}}
</div>
</div>
<br>
Expand Down

0 comments on commit bee3732

Please sign in to comment.