rule: mstsc shadowing
This commit is contained in:
@@ -0,0 +1,21 @@
|
||||
title: MSTSC Shadowing
|
||||
id: 6ba5a05f-b095-4f0a-8654-b825f4f16334
|
||||
status: Detects RDP session hijacking by using MSTSC shadowing
|
||||
description:
|
||||
author: Florian Roth
|
||||
date: 2020/01/24
|
||||
references:
|
||||
- https://twitter.com/kmkz_security/status/1220694202301976576
|
||||
- https://github.com/kmkz/Pentesting/blob/master/Post-Exploitation-Cheat-Sheet
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine|contains|all:
|
||||
- 'noconsentprompt'
|
||||
- 'shadow:'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
Reference in New Issue
Block a user