Skip to content

New Test T1659 (Content Injection Using MITM Proxy)#3305

Open
wai-lo-401 wants to merge 12 commits intoredcanaryco:masterfrom
wai-lo-401:patch-3
Open

New Test T1659 (Content Injection Using MITM Proxy)#3305
wai-lo-401 wants to merge 12 commits intoredcanaryco:masterfrom
wai-lo-401:patch-3

Conversation

@wai-lo-401
Copy link
Copy Markdown
Contributor

Following guidance from Sir @cyberbuff , I updated the attack technique using mitmproxy to properly align with T1659 (Content Injection). The revised test now supports and works across all major platforms.

Reference
https://attack.mitre.org/techniques/T1659/

Windows
windows

Linux
Linux

MacOS
macos

wai-lo-401 and others added 11 commits January 30, 2026 23:45
Add content injection simulations for Windows, Linux, and macOS.

These tests simulate an adversary-style modification of a local HTML file 
by injecting a malicious script tag designed to redirect the user. 
This models the post-injection artifacts and file modifications 
defenders look for when identifying T1659.

- Windows: Uses PowerShell and validates via Microsoft Edge.
- Linux: Uses sed and validates via xdg-open.
- macOS: Uses sed and validates via Safari.

All tests include automated cleanup commands to remove temporary artifacts 
and terminate spawned browser processes.
Need to change another file
I want to add another test file using mitmproxy
Added tests for content injection technique T1659, including proxy setup and validation for both macOS/Linux and Windows platforms.
@wai-lo-401
Copy link
Copy Markdown
Contributor Author

Sir @cyberbuff any update or suggestion about this test. I did exactly what you told me on previous PR. I updated the script.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants