Files
blue-team-tools/rules/network/cisco/aaa/cisco_cli_input_capture.yml
T

26 lines
631 B
YAML
Raw Normal View History

2020-03-25 14:36:34 +01:00
title: Cisco Show Commands Input
id: b094d9fb-b1ad-4650-9f1a-fb7be9f1d34b
2021-11-27 11:33:14 +01:00
status: test
2020-03-25 14:36:34 +01:00
description: See what commands are being input into the device by other people, full credentials can be in the history
author: Austin Clark
date: 2019/08/11
2021-11-27 11:33:14 +01:00
modified: 2021/11/27
2020-03-25 14:36:34 +01:00
logsource:
2021-11-27 11:33:14 +01:00
product: cisco
service: aaa
category: accounting
2020-03-25 14:36:34 +01:00
detection:
2021-11-27 11:33:14 +01:00
keywords:
- 'show history'
- 'show history all'
- 'show logging'
condition: keywords
fields:
- CmdSet
2020-03-25 14:36:34 +01:00
falsepositives:
2021-11-27 11:33:14 +01:00
- Not commonly run by administrators, especially if remote logging is configured
2020-03-25 14:36:34 +01:00
level: medium
2020-09-15 07:02:30 -06:00
tags:
2021-11-27 11:33:14 +01:00
- attack.credential_access
- attack.t1552.003