-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update proc_creation_win_remote_access_tools_anydesk_piped_password_via_cli.yml #5139
Conversation
hi, |
In this article, it also supports this finding: I am unable to find "ParentCommandLine" in the 4688 events, but here are the XMLs:
|
@DanielKoifman this rule is taking the case where the attacker uses quotes like this If you want to catch any |
Thanks @nasbench I will close this PR and create a new rule based only on --set-password. |
Why close and not update this one? Closing and opening PRs is not fun for ys reviewers. So please refrain from unnecessarily closing PR that have comments and review. |
Summary of the Pull Request
Removed "/c" and "echo" parts of the command detection.
This is due to the fact that when you pipe a command in CMD, it actually splits the command into parts, one event for each pipe, as can be seen in the photos using the command example from the rule itself:
Changelog
Update proc_creation_win_remote_access_tools_anydesk_piped_password_via_cli.yml
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions