mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 17:58:52 +00:00
[OSCD] Bad Opsec Defaults Sacrificial Processes
Incorporate feedback from @yugoslavskiy;
This commit is contained in:
parent
e5567631eb
commit
dc41f64023
@ -1,7 +1,7 @@
|
||||
title: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
|
||||
id: a7c3d773-caef-227e-a7e7-c2f13c622329
|
||||
status: experimental
|
||||
description: 'Detects attackers using tooling with bad opsec defaults e.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run, one trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit @am0nsec), and other examples.'
|
||||
description: 'Detects attackers using tooling with bad opsec defaults e.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run, one trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit am0nsec), and other examples.'
|
||||
author: 'Oleg Kolesnikov @securonix invrep_de, oscd.community'
|
||||
date: 2020/10/23
|
||||
references:
|
||||
|
Loading…
Reference in New Issue
Block a user