Files
blue-team-tools/rules/web/web_path_traversal_exploitation_attempt.yml
T

25 lines
698 B
YAML
Raw Normal View History

title: Path Traversal Exploitation Attempts
2021-09-25 11:37:39 +02:00
id: 7745c2ea-24a5-4290-b680-04359cb84b35
author: Subhash Popuri (@pbssubhash), Florian Roth (generalisation)
2021-09-25 11:37:39 +02:00
date: 2021/09/25
status: experimental
description: Detects path traversal exploitation attempts
references:
- https://github.com/projectdiscovery/nuclei-templates
logsource:
category: webserver
detection:
selection:
c-uri|contains:
- '../../../../../etc/passwd'
- '../../../../windows/'
- '../../../../../lib/password'
condition: selection
2021-11-27 11:27:40 +01:00
falsepositives:
- Happens all the time on systems exposed to the Internet
- Internal vulnerability scanners
tags:
- attack.initial_access
- attack.t1190
level: medium