Skip to content

Instantly share code, notes, and snippets.

@abhaybhargav
Created August 31, 2019 02:08
Show Gist options
  • Select an option

  • Save abhaybhargav/ba4e8ac81529bf71db9db58e8370bcad to your computer and use it in GitHub Desktop.

Select an option

Save abhaybhargav/ba4e8ac81529bf71db9db58e8370bcad to your computer and use it in GitHub Desktop.
{"id":"925ebe3d-65bf-4d48-be3d-dc4bb86a18ce","title":"Steal Customer Info from other Reps","mindmap":{"root":{"id":"c556daf7-9465-4793-959d-d1ddf553788f","parentId":null,"text":{"caption":"Steal Customer Info from other Reps","font":{"style":"normal","weight":"bold","decoration":"none","size":20,"color":"#000000"}},"offset":{"x":0,"y":0},"foldChildren":false,"branchColor":"#000000","children":[{"id":"b6cd1bc9-3a78-4560-b680-a8da3e3c16a3","parentId":"c556daf7-9465-4793-959d-d1ddf553788f","text":{"caption":"Leverage other Rep(s)","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":127.96875,"y":-27.4375},"foldChildren":false,"branchColor":"#ad9b69","children":[{"id":"95482943-20c2-46d1-9220-a4b24f833dff","parentId":"b6cd1bc9-3a78-4560-b680-a8da3e3c16a3","text":{"caption":"Threaten other rep","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":205.57194010416666,"y":-135.65152994791666},"foldChildren":false,"branchColor":"#ad9b69","children":[]},{"id":"fda9be5c-603a-4377-8d19-f6bfaf1244d3","parentId":"b6cd1bc9-3a78-4560-b680-a8da3e3c16a3","text":{"caption":"Social Engineering","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":207.45068359375,"y":48.662882486979164},"foldChildren":false,"branchColor":"#ad9b69","children":[]},{"id":"3d01e257-11bf-4137-b225-581cb2ceab85","parentId":"b6cd1bc9-3a78-4560-b680-a8da3e3c16a3","text":{"caption":"Otherwise coerce other rep","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":237.88631184895834,"y":179.65909830729166},"foldChildren":false,"branchColor":"#ad9b69","children":[]},{"id":"103ef3e0-60e9-41ce-adf2-b346df10d26a","parentId":"b6cd1bc9-3a78-4560-b680-a8da3e3c16a3","text":{"caption":"Malware in rep's computer/mobile device","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":251.27652994791666,"y":316.98863728841144},"foldChildren":false,"branchColor":"#ad9b69","children":[]}]},{"id":"b03e8e06-9fdc-4ab7-8987-b7044d7d3002","parentId":"c556daf7-9465-4793-959d-d1ddf553788f","text":{"caption":"Leverage CRM System","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-166.452277399972,"y":-204.32814916305858},"foldChildren":false,"branchColor":"#87d442","children":[{"id":"497b268c-8145-4fd5-9934-5db3c32714ad","parentId":"b03e8e06-9fdc-4ab7-8987-b7044d7d3002","text":{"caption":"Steal Passwords","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-155.47524961244332,"y":-5},"foldChildren":false,"branchColor":"#87d442","children":[{"id":"a97dddd6-408e-449f-9897-62fb163e5133","parentId":"497b268c-8145-4fd5-9934-5db3c32714ad","text":{"caption":"XSS/Client-side Flaws","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-197.85982259114584,"y":-6.011393229166667},"foldChildren":false,"branchColor":"#87d442","children":[]},{"id":"73775a2e-7a43-413f-a258-5db96dcb05af","parentId":"497b268c-8145-4fd5-9934-5db3c32714ad","text":{"caption":"CSRF","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-157.471572986829,"y":110},"foldChildren":false,"branchColor":"#87d442","children":[]},{"id":"91161e42-8ded-4919-8317-b1cd15bd6215","parentId":"497b268c-8145-4fd5-9934-5db3c32714ad","text":{"caption":"leverage Session based Flaws","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-217.93937174479166,"y":-164.66666666666666},"foldChildren":false,"branchColor":"#87d442","children":[]}]},{"id":"3ff6846d-cf87-462a-b792-16bce0a7a39e","parentId":"b03e8e06-9fdc-4ab7-8987-b7044d7d3002","text":{"caption":"Attack Database/OS","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-159.41397136531256,"y":89},"foldChildren":false,"branchColor":"#87d442","children":[{"id":"5c6d91f4-1f9d-45fe-8aa3-f240ab5287aa","parentId":"3ff6846d-cf87-462a-b792-16bce0a7a39e","text":{"caption":"Injection Flaws","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-170.18941243489584,"y":141.33711751302084},"foldChildren":false,"branchColor":"#87d442","children":[]},{"id":"8423e69e-92d2-4373-8c19-4854ac93a60c","parentId":"3ff6846d-cf87-462a-b792-16bce0a7a39e","text":{"caption":"Other Remote Code Exec Flaws","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-157.85986328125,"y":221.31437174479166},"foldChildren":false,"branchColor":"#87d442","children":[]},{"id":"ff6c8c85-4309-475f-ac7d-b88db942794d","parentId":"3ff6846d-cf87-462a-b792-16bce0a7a39e","text":{"caption":"Leverage existing exploit against hosting environ","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-169.8447265625,"y":352.6590983072917},"foldChildren":false,"branchColor":"#87d442","children":[]}]}]},{"id":"e885d274-df07-4b11-9ca6-cd490bbd190c","parentId":"c556daf7-9465-4793-959d-d1ddf553788f","text":{"caption":"Leverage Users behind CRM System","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-169.58333333333334,"y":304.2045084635417},"foldChildren":false,"branchColor":"#a802e5","children":[{"id":"3f0c9985-b457-46b3-8808-5291a2e7ca61","parentId":"e885d274-df07-4b11-9ca6-cd490bbd190c","text":{"caption":"Social Engineering Devs/DevOps","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-300.6818033854167,"y":131.662841796875},"foldChildren":false,"branchColor":"#a802e5","children":[]},{"id":"345ca89c-afa5-43cd-8d70-79146a91ca54","parentId":"e885d274-df07-4b11-9ca6-cd490bbd190c","text":{"caption":"Bribe Dev/DevOps/DBA","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-244.11360677083334,"y":252.98486328125},"foldChildren":false,"branchColor":"#a802e5","children":[]},{"id":"c487232e-36b5-4d72-9c2b-fa50b4246b13","parentId":"e885d274-df07-4b11-9ca6-cd490bbd190c","text":{"caption":"Threaten Dev/DevOps/DBA","font":{"style":"normal","weight":"normal","decoration":"none","size":15,"color":"#000000"}},"offset":{"x":-217.52652994791666,"y":376.3409423828125},"foldChildren":false,"branchColor":"#a802e5","children":[]}]}]}},"dates":{"created":1567058760939,"modified":1567060048233},"dimensions":{"x":4000,"y":2000},"autosave":false}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment