rework: impossible rule with Sysmon

This commit is contained in:
Florian Roth 2021-01-19 14:12:40 +01:00
parent fdc969385a
commit eedc483be4
2 changed files with 1 additions and 29 deletions

View File

@ -1,27 +0,0 @@
title: Suspicious Plink Non-Standard Port
id: 576131ea-77e3-4f8e-ab39-f0bcbcc7c68c
status: experimental
description: Detects suspicious Plink use to a port that is not Port 22/tcp (default for SSH)
references:
- https://www.real-sec.com/2019/04/bypassing-network-restrictions-through-rdp-tunneling/
- https://medium.com/@informationsecurity/remote-ssh-tunneling-with-plink-exe-7831072b3d7d
author: Florian Roth
date: 2021/01/19
tags:
- attack.command_and_control
- attack.t1572
- attack.lateral_movement
- attack.t1021.001
logsource:
category: network_connection
product: windows
detection:
selection:
Description: 'Command-line SSH, Telnet, and Rlogin client'
Initiated: 'true'
filter:
DestinationPort: 22
condition: selection and not filter
falsepositives:
- Environments in which SSH servers don't run on port 22/tcp
level: high

View File

@ -13,12 +13,11 @@ tags:
- attack.lateral_movement
- attack.t1021.001
logsource:
category: network_connection
category: process_creation
product: windows
detection:
selection:
Description: 'Command-line SSH, Telnet, and Rlogin client'
Initiated: 'true'
CommandLine|contains: ' -R '
condition: selection
falsepositives: