Files
blue-team-tools/rules/proxy/proxy_pwndrop.yml
T

28 lines
613 B
YAML
Raw Normal View History

2020-04-17 08:55:40 +02:00
title: PwnDrp Access
id: 2b1ee7e4-89b6-4739-b7bb-b811b6607e5e
2021-11-27 11:33:14 +01:00
status: test
2020-04-17 08:55:40 +02:00
description: Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity
author: Florian Roth
2020-09-15 07:02:30 -06:00
references:
2021-11-27 11:33:14 +01:00
- https://breakdev.org/pwndrop/
date: 2020/04/15
modified: 2021/11/27
2020-04-17 08:55:40 +02:00
logsource:
2021-11-27 11:33:14 +01:00
category: proxy
2020-04-17 08:55:40 +02:00
detection:
2021-11-27 11:33:14 +01:00
selection:
c-uri|contains: '/pwndrop/'
condition: selection
2020-04-17 08:55:40 +02:00
fields:
2021-11-27 11:33:14 +01:00
- ClientIP
- c-uri
- c-useragent
2020-04-17 08:55:40 +02:00
falsepositives:
2021-11-27 11:33:14 +01:00
- Unknown
2020-04-17 08:55:40 +02:00
level: critical
2020-09-15 07:02:30 -06:00
tags:
2021-11-27 11:33:14 +01:00
- attack.command_and_control
- attack.t1071.001
- attack.t1102.001
- attack.t1102.003