Rew rule examples: RC4 Kerberos, JAVA remote debugging process

This commit is contained in:
Florian Roth 2017-02-06 20:03:42 +01:00
parent e7d62f8fbe
commit 810758a9f5
2 changed files with 33 additions and 0 deletions

View File

@ -0,0 +1,18 @@
title: Suspicious Kerberos RC4 Ticket Encryption
status: experimental
reference: https://adsecurity.org/?p=3458
description: Detects logons using RC4 encryption type
detection:
selection:
- EventLog: Security
EventID: 4769
TicketOptions: '0x40810000'
TicketEncryption: '0x17'
reduction:
- ServiceName: '$*'
- Type: 'Success Audit'
condition: selection and not reduction
falsepositives:
- Service accounts used on legacy systems (e.g. NetApp)
- Windows Domains with DFL 2003 and legacy systems
level: 40

View File

@ -0,0 +1,15 @@
title: Java running with Remote Debugging
description:
reference:
detection:
selection:
- EventLog: Microsoft-Windows-Sysmon/Operational
- EventID: 1
- CommandLine: '*transport=dt_socket,address=*'
exclusion:
- CommandLine: '*address=127.0.0.1*'
- CommandLine: '*address=localhost*'
condition: selection and not exclusion
falsepositives:
- unknown
level: 30