Update rules-threat-hunting/windows/powershell/powershell_script/posh_ps_win_api_library_access.yml
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
e69daf27a1
commit
dae7fff209
+1
-1
@@ -8,7 +8,7 @@ related:
|
||||
- id: 19d65a1c-8540-4140-8062-8eb00db0bba5
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects calls to WinAPI functions from PowerShell scripts. Attackers can often leverage these API to avoid detection based on typical PowerShell function calls. Use this rule as a basis to hunt for interesting scripts.
|
||||
description: Detects calls to WinAPI functions from PowerShell scripts. Attackers can often leverage these APIs to avoid detection based on typical PowerShell function calls. Use this rule as a basis to hunt for interesting scripts.
|
||||
references:
|
||||
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
|
||||
author: Nikita Nazarov, oscd.community, Nasreddine Bencherchali (Nextron Systems)
|
||||
|
||||
Reference in New Issue
Block a user