Files
blue-team-tools/rules/proxy/proxy_powershell_ua.yml
T

23 lines
648 B
YAML
Raw Normal View History

2017-03-13 13:51:32 +01:00
title: Windows PowerShell User Agent
2019-11-12 23:12:27 +01:00
id: c8557060-9221-4448-8794-96320e6f3e74
2017-03-13 13:51:32 +01:00
status: experimental
description: Detects Windows PowerShell Web Access
references:
- https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
2017-03-13 13:51:32 +01:00
author: Florian Roth
date: 2017/03/13
2017-03-13 13:51:32 +01:00
logsource:
2017-09-11 00:35:52 +02:00
category: proxy
2017-03-13 13:51:32 +01:00
detection:
selection:
2019-12-07 00:11:33 +01:00
c-useragent: '* WindowsPowerShell/*'
2017-03-13 13:51:32 +01:00
condition: selection
2017-09-12 23:54:04 +02:00
fields:
- ClientIP
2019-12-07 00:11:33 +01:00
- c-uri
- c-useragent
2017-03-13 13:51:32 +01:00
falsepositives:
- Administrative scripts that download files from the Internet
- Administrative scripts that retrieve certain website contents
level: medium