2022-01-08 09:17:56 +01:00
title : Enable Windows Remote Management
id : 991a9744-f2f0-44f2-bd33-9092eba17dc3
status : experimental
description : Adversaries may use Valid Accounts to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.
references :
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1021.006/T1021.006.md#atomic-test-1---enable-windows-remote-management
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/enable-psremoting?view=powershell-7.2
author : frack113
date : 2022 /01/07
logsource :
product : windows
category : ps_script
definition : 'Script block logging must be enabled'
detection :
selection_cmdlet :
ScriptBlockText|contains : 'Enable-PSRemoting '
condition : selection_cmdlet
falsepositives :
2022-03-16 14:39:23 +01:00
- Legitimate script
2022-01-08 09:17:56 +01:00
level : medium
tags :
- attack.lateral_movement
- attack.t1021.006