title: Metasploit SMB Authentication description: Alerts on Metasploit host's authentications on the domain. id: 72124974-a68b-4366-b990-d30e0b2a190d author: Chakib Gzenayi (@Chak092), Hosni Mribah date: 2020/05/06 references: - https://github.com/rapid7/metasploit-framework/blob/master/lib/rex/proto/smb/client.rb tags: - attack.credential_access - attack.t1110 logsource: product: windows service: security detection: selection1: EventID: - 4625 - 4624 LogonType: 3 AuthenticationPackage: 'NTLM' WorkstationName|re: '^[A-Za-z0-9]{16}$' selection2: ProcessName: EventID: 4776 SourceWorkstation|re: '^[A-Za-z0-9]{16}$' condition: selection1 OR selection2 falsepositives: - Linux hostnames composed of 16 characters. level: high