Files
blue-team-tools/rules/windows/process_creation/win_commandline_path_traversal.yml
T

24 lines
855 B
YAML
Raw Normal View History

2020-06-11 15:48:48 +02:00
title: Cmd.exe CommandLine Path Traversal
id: 087790e3-3287-436c-bccf-cbd0184a7db1
description: detects the usage of path traversal in cmd.exe indicating possible command/argument confusion/hijacking
status: experimental
date: 2020/06/11
author: xknow @xknow_infosec
references:
- https://hackingiscool.pl/cmdhijack-command-argument-confusion-with-path-traversal-in-cmd-exe/
- https://twitter.com/Oddvarmoe/status/1270633613449723905
tags:
- attack.execution
- attack.t1059.003
- attack.t1059 # an old one
2020-06-11 15:48:48 +02:00
logsource:
2020-06-11 15:58:05 +02:00
category: process_creation
2020-06-11 15:48:48 +02:00
product: windows
detection:
2020-06-11 16:23:15 +02:00
selection:
2020-06-11 15:48:48 +02:00
ParentCommandLine|contains: 'cmd*/c'
CommandLine|contains: '/../../'
2020-06-11 16:23:15 +02:00
condition: selection
2020-06-11 15:48:48 +02:00
falsepositives:
- (not much) some benign Java tools may product false-positive commandlines for loading libraries
level: high