Title : MITRE BZAR Indicators for Execution
Rule id : b640c0b8-87f8-4daa-aef8-95a24261dd1d
Url | |
---|---|
https://github.com/mitre-attack/bzar#indicators-for-attck-execution | pdf/1f9bd419525cc912eb38b33822f779660843e49158f6fec34af342c7a24a8421.pdf |
Title : MITRE BZAR Indicators for Persistence
Rule id : 53389db6-ba46-48e3-a94c-e0f2cefe1583
Url | |
---|---|
https://github.com/mitre-attack/bzar#indicators-for-attck-persistence | pdf/e1c70744df497dfbe43228dcc1856885991550c66cf789d924f3de30b4a8e271.pdf |
Title : Potential PetitPotam Attack Via EFS RPC Calls
Rule id : 4096842a-8f9f-4d36-92b4-d0b2a62f9b2a
Title : Possible PrintNightmare Print Driver Install
Rule id : 7b33baef-2a75-4ca3-9da4-34f9a15382d8
Title : SMB Spoolss Name Piped Usage
Rule id : bae2865c-5565-470d-b505-9496c87d0c30
Title : Default Cobalt Strike Certificate
Rule id : 7100f7e3-92ce-4584-b7b7-01b40d3d4118
Title : DNS Events Related To Mining Pools
Rule id : bf74135c-18e8-4a72-a926-0e4f47888c19
Title : New Kind of Network (NKN) Detection
Rule id : fa7703d6-0ee8-4949-889c-48c84bc15b6f
Title : Suspicious DNS Z Flag Bit Set
Rule id : ede05abc-2c9e-4624-9944-9ff17fdc0bf5
Title : DNS TOR Proxies
Rule id : a8322756-015c-42e7-afb1-436e85ed3ff5
Title : Executable from Webdav
Rule id : aac2fd97-bcba-491b-ad66-a6edf89c71bf
Title : OMIGOD HTTP No Authentication RCE
Rule id : ab6b1a39-a9ee-4ab4-b075-e83acf6e346b
Title : WebDav Put Request
Rule id : 705072a5-bb6f-4ced-95b6-ecfa6602090b
Url | |
---|---|
OTRF/detection-hackathon-apt29#17 | pdf/b535fb39928c6befa6badca769c3a386b19540d5780c1ef286b995e39c3bcf99.pdf |
Title : Publicly Accessible RDP Service
Rule id : 1fc0809e-06bf-4de3-ad52-25e5263b7623
Url | |
---|---|
https://attack.mitre.org/techniques/T1021/001/ | pdf/e8deeaf18779c2db43e80f107e11b542c3f6793eb7d000d11231f8c21f588e38.pdf |
Title : Remote Task Creation via ATSVC Named Pipe - Zeek
Rule id : dde85b37-40cd-4a94-b00c-0b8794f956b5
Url | |
---|---|
https://web.archive.org/web/20230409194125/https://blog.menasec.net/2019/03/threat-hunting-25-scheduled-tasks-for.html | pdf/dac575d90e6bbc7741c7729a88d6a7865a555b3400a8c0476196fb87c9c29c9a.pdf |
Title : Possible Impacket SecretDump Remote Activity - Zeek
Rule id : 92dae1ed-1c9d-4eff-a567-33acbd95b00e
Url | |
---|---|
https://web.archive.org/web/20230329153811/https://blog.menasec.net/2019/02/threat-huting-10-impacketsecretdump.html | pdf/c1b4284f58a81821485f95b4b4656597057da31420c61f2fd0fa1833296f8e4a.pdf |
Title : First Time Seen Remote Named Pipe - Zeek
Rule id : 021310d9-30a6-480a-84b7-eaa69aeb92bb
Url | |
---|---|
https://twitter.com/menasec1/status/1104489274387451904 | pdf/3a72d96d6d41d15cde4cc290e0d61f7cf9557eb23724a1b09fa0f1b982c145f4.pdf |
Title : Suspicious PsExec Execution - Zeek
Rule id : f1b3a22a-45e6-4004-afb5-4291f9c21166
Url | |
---|---|
https://web.archive.org/web/20230329171218/https://blog.menasec.net/2019/02/threat-hunting-3-detecting-psexec.html | pdf/9f480708815e12225bca8cc197f52cf846de0649517768356020b4124a2e59f6.pdf |
Title : Suspicious Access to Sensitive File Extensions - Zeek
Rule id : 286b47ed-f6fe-40b3-b3a8-35129acd43bc
Url |
---|
Title : Transferring Files with Credential Data via Network Shares - Zeek
Rule id : 2e69f167-47b5-4ae7-a390-47764529eff5
Url | |
---|---|
https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment | pdf/52e26c81a11e8750dcb450054f7519ab7fa64b2a0e94d3c66075f12ea424e9d0.pdf |
Title : Kerberos Network Traffic RC4 Ticket Encryption
Rule id : 503fe26e-b5f2-4944-a126-eab405cc06e5
Url | |
---|---|
https://adsecurity.org/?p=3458 | pdf/c0f86787baaf5ec548c7f0b43a485bb508afd60623e0cf92c1de51291d568841.pdf |