You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Detects potential exploitation of CVE-2024-1709 an unauthenticated command injection in Progress Kemp LoadMaster.
6
+
It looks for GET requests to '/access/set' API with the parameters 'param=enableapi' and 'value=1' as well as an "Authorization" header with a base64 encoded value with an uncommon character.
Copy file name to clipboardExpand all lines: rules-threat-hunting/windows/process_creation/proc_creation_win_cmd_redirect.yml
+7-4
Original file line number
Diff line number
Diff line change
@@ -4,15 +4,18 @@ related:
4
4
- id: 8e0bb260-d4b2-4fff-bb8d-3f82118e6892
5
5
type: similar
6
6
status: test
7
-
description: Detects the use of the redirection character ">" to redicrect information in commandline
7
+
description: |
8
+
Detects the use of the redirection character ">" to redirect information on the command line.
9
+
This technique is sometimes used by malicious actors in order to redirect the output of reconnaissance commands such as "hostname" and "dir" to files for future exfiltration.
description: Detects the creation of new files with the ".evtx" extension in non-common locations. Which could indicate tampering with default evtx locations in order to evade security controls
4
+
description: |
5
+
Detects the creation of new files with the ".evtx" extension in non-common or non-standard location.
6
+
This could indicate tampering with default EVTX locations in order to evade security controls or simply exfiltration of event log to search for sensitive information within.
7
+
Note that backup software and legitimate administrator might perform similar actions during troubleshooting.
- An unknown bug seems to trigger the Windows "svchost" process to drop EVTX files in the "C:\Windows\Temp" directory in the form "<log_name">_<uuid>.evtx". See https://superuser.com/questions/1371229/low-disk-space-after-filling-up-c-windows-temp-with-evtx-and-txt-files
description: Detects inline Windows shell commands redirecting output via the ">" symbol to a suspicious location
9
+
description: |
10
+
Detects inline Windows shell commands redirecting output via the ">" symbol to a suspicious location.
11
+
This technique is sometimes used by malicious actors in order to redirect the output of reconnaissance commands such as "hostname" and "dir" to files for future exfiltration.
MaxMpxCt specifies the maximum outstanding network requests for the server per client, which is used when negotiating a Server Message Block (SMB) connection with a client. Note if the value is set beyond 125 older Windows 9x clients will fail to negotiate.
7
+
Ransomware threat actors and operators (specifically BlackCat) were seen increasing this value in order to handle a higher volume of traffic.
0 commit comments