2022-01-10 18:04:43 +02:00
title : Possible DCSync Attack
2022-01-20 11:57:10 +02:00
id : 56fda488-113e-4ce9-8076-afc2457922c3
2022-01-10 18:04:43 +02:00
description : Detects remote RPC calls to MS-DRSR from non DC hosts, which could indicate DCSync / DCShadow attacks.
references :
- https://attack.mitre.org/techniques/T1033/
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-drsr/f977faaa-673e-4f66-b9bf-48c640241d47?redirectedfrom=MSDN
2022-01-20 11:57:10 +02:00
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-DRSR.md
2022-01-20 16:53:01 +02:00
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
2022-01-10 18:04:43 +02:00
tags :
- attack.t1033
status : experimental
author : Sagie Dulce, Dekel Paz
date : 2022 /01/01
modified : 2022 /01/01
logsource :
2022-01-23 09:44:24 +02:00
product : rpc_firewall
category : application
2022-01-10 18:04:43 +02:00
definition: 'Requirements : install and apply the RPC Firewall to all processes, enable DRSR UUID (e3514235-4b06-11d1-ab04-00c04fc2dcd2) for "dangerous" opcodes (not 0,1 or 12) only from trusted IPs (DCs)'
detection :
selection :
2022-01-20 17:27:47 +02:00
EventLog : RPCFW
2022-01-10 18:04:43 +02:00
EventID : 3
InterfaceUuid : e3514235-4b06-11d1-ab04-00c04fc2dcd2
filter :
OpNum :
- 0
- 1
- 12
condition : selection and not filter
falsepositives :
- Unknown
level : high