3CX DLL-Sideloading attack: What you need to know
curl -X GET \ optix.sophos.com/.../whitelistIPs \ -H 'Authorization: ApiKey <API_KEY>'
curl -X GET \ optix.sophos.com/.../count \ -H 'Authorization: ApiKey <API_KEY>'
curl -X GET \ 'optix.sophos.com/.../count \ -H 'Authorization: ApiKey <API_KEY>'
curl -X GET \ 'optix.sophos.com/.../alerts \ -H 'Authorization: ApiKey <API_KEY>'
curl -X POST \ optix.sophos.com/.../whitelistIPs \ -H 'Authorization: ApiKey <API_KEY>' \ -H 'Content-Type: application/json' \ -d '{ "accountIds": null, "data": { "ips": [ "2.2.2.2", "3.3.3.3" ] } }'
# Create a JSON file with the following content { "accountIds": null, "data": { "ips": [ "2.2.2.2", "3.3.3.3" ] } } # Post the request and reference the JSON file. E.g. If the file is called "ipwhitelist.json" curl -X POST \ optix.sophos.com/.../whitelistIPs \ -H 'Authorization: ApiKey <API_KEY>' \ -H 'Content-Type: application/json' \ -d @ipwhitelist.json
Extremely intriguing , great job and a debt of gratitude is in order for sharing a decent article. TellCulvers