Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_hack_hydra.yml
T

31 lines
792 B
YAML
Raw Normal View History

2020-10-05 23:05:27 +03:00
title: Hydra Password Guessing Hack Tool
2020-10-05 23:52:55 +03:00
id: aaafa146-074c-11eb-adc1-0242ac120002
2021-11-27 11:33:14 +01:00
status: test
2020-10-05 23:05:27 +03:00
description: Detects command line parameters used by Hydra password guessing hack tool
author: Vasiliy Burov
references:
2021-11-27 11:33:14 +01:00
- https://github.com/vanhauser-thc/thc-hydra
- https://attack.mitre.org/techniques/T1110/001/
2020-10-05 23:05:27 +03:00
date: 2020/10/05
2021-11-27 11:33:14 +01:00
modified: 2021/11/27
2020-10-05 23:05:27 +03:00
logsource:
2021-11-27 11:33:14 +01:00
category: process_creation
product: windows
2020-10-05 23:05:27 +03:00
detection:
2021-11-27 11:33:14 +01:00
selection1:
CommandLine|contains|all:
- '-u '
- '-p '
selection2:
CommandLine|contains:
- '^USER^'
- '^PASS^'
condition: selection1 and selection2
2020-10-05 23:05:27 +03:00
falsepositives:
2021-11-27 11:33:14 +01:00
- Software that uses the caret encased keywords PASS and USER in its command line
2020-10-05 23:05:27 +03:00
level: high
2021-11-27 11:33:14 +01:00
tags:
- attack.credential_access
- attack.t1110
- attack.t1110.001