Commit Graph

12526 Commits

Author SHA1 Message Date
frack113 7d6f32d1be Merge PR #4850 from @frack113 - Cleanup rule conditions to align with standard
chore: Cleanup conditions
update: Scheduled Task Creation From Potential Suspicious Parent Location - Add additional "temporary folder" locations.

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 12:10:33 +02:00
frack113 aaf51bf880 Merge PR #4830 from @frack113 - Enhance Wbadmin based rules
new: All Backups Deleted Via Wbadmin.EXE
new: Sensitive File Dump Via Wbadmin.EXE
new: File Recovery From Backup Via Wbadmin.EXE
new: Sensitive File Recovery From Backup Via Wbadmin.EXE
update: Windows Backup Deleted Via Wbadmin.EXE - Enhance logic and increase coverage

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-13 11:15:30 +02:00
Joe 6412c1a02b Merge PR #4822 from @hasselj - Add Potentially Suspicious Malware Callback Communication - Linux
new: Potentially Suspicious Malware Callback Communication - Linux
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 17:07:43 +02:00
frack113 fe26ffa0f2 Merge PR #4838 from @frack113 - Add Access To Windows Outlook Mail Files By Uncommon Application
new: Access To Windows Outlook Mail Files By Uncommon Application

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:56:57 +02:00
Ahmed Farouk b175b15033 Merge PR #4845 from @ahmedfarou22 - Proxy WebDAV Rule Improvements/New Rule
new: Suspicious External WebDAV Execution
remove: Search-ms and WebDAV Suspicious Indicators in URL
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:16:42 +02:00
frack113 392e3a39c8 Merge PR #4843 from @frack113 - Add New-NetFirewallRule usage related rules
new: New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet
new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock
update: New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application - Add new EID and paths
update: Uncommon New Firewall Rule Added In Windows Firewall Exception List - Add new EID and paths

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 15:58:39 +02:00
frack113 7cdcb7605c Merge PR #4844 from @frack113 - Update UAC based rules
update: UAC Disabled - update metadata
new: UAC Secure Desktop Prompt Disabled
new: UAC Notification Disabled 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 13:39:30 +02:00
github-actions[bot] f7ec533704 Merge PR #4841 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from "experimental" to "test"
2024-05-02 10:34:25 +02:00
Expected 39db80478e Merge PR #4834 from @CertainlyP - Add Outbound Network Connection Initiated By Microsoft Dialer
Create Release / Create Release (push) Has been cancelled
new: Outbound Network Connection Initiated By Microsoft Dialer 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-29 12:54:38 +02:00
James C 6ac6153976 Merge PR #4836 from @jamesc-grafana - Update AWS Rule to use fieldref modifier instead of contains
update: AWS User Login Profile Was Modified - use fieldref instead of contains modifier
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-29 12:53:54 +02:00
Nasreddine Bencherchali 481337a8c3 Merge PR #4837 from @nasbench - fix fp reported in #4820
fix: ADS Zone.Identifier Deleted By Uncommon Application - Filter out "chrome" and "firefox" processes.
2024-04-26 15:39:44 +02:00
Nasreddine Bencherchali f61c1f4509 Merge PR #4832 from @nasbench - Update LOLBIN rules
update: Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE - Update logic to add additional variation of the extensions
update: Arbitrary File Download Via ConfigSecurityPolicy.EXE - Update description
update: C# IL Code Compilation Via Ilasm.EXE - Add flags to increase accuracy of the rule instead of it focusing on "any" execution
update: COM Object Execution via Xwizard.EXE - Update logic
update: JScript Compiler Execution - Update metadata
update: ManageEngine Endpoint Central Dctask64.EXE Potential Abuse - Update logic to account for flags and increase accuracy
update: Potential Application Whitelisting Bypass via Dnx.EXE - Update description
update: Potential Arbitrary Command Execution Via FTP.EXE - Use "windash" modifier and update description
update: Potential Arbitrary File Download Via Cmdl32.EXE - Remove unnecessary spaces to account for flags being at the end.
update: Renamed ZOHO Dctask64 Execution - Add additional imphash values
update: Windows Kernel Debugger Execution - Reduce level to "medium"
update: Xwizard.EXE Execution From Non-Default Location - Update description

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-26 13:40:11 +02:00
frack113 22b3416fee Merge PR #4829 from @frack113 - Add Network Connection Initiated By RegAsm.EXE
new: Network Connection Initiated By RegAsm.EXE
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-25 16:31:56 +02:00
dan21san c31507f74e Merge PR #4824 from @dan21san - New PUA SoftPerfect
new: PUA - SoftPerfect Netscan Execution

---------

Co-authored-by: Degasperi <Daniel.Degasperi.ext@wuerth-phoenix.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-25 15:18:58 +02:00
pratinavchandra e1a713d264 Merge PR #4823 from @pratinavchandra - Update CLI flag for Gatekeeper Bypass via Xattr
update: Gatekeeper Bypass via Xattr - Update command line flag 

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-04-19 11:10:38 +02:00
signalblur a1a3b29692 Merge PR #4795 from @signalblur - Update Linux Command History Tampering rule
update: Linux Command History Tampering - Increase coverage to include other history files 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-17 14:28:17 +02:00
nikitah4x 5b4bfd6ffd Merge PR #4814 from @nikitah4x - Add new rule to detect MFA bypass in Cisco Duo
new: Cisco Duo Successful MFA Authentication Via Bypass Code

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-17 12:28:38 +02:00
signalblur 86ca651ea6 Merge PR #4801 from @signalblur - Add Pnscan rule
new: Pnscan Binary Data Transmission Activity 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-16 14:36:41 +02:00
Fukusuke Takahashi 4dc77dc175 Merge PR #4819 from @fukusuket - Fix regex escape
fix: Invoke-Obfuscation Via Stdin - explicitly escape { to make it clear that it is a literal
2024-04-16 12:57:45 +02:00
Fukusuke Takahashi 1a85bc5b5a Merge PR #4799 from @fukusuket - Fix typo in selection name
chore: fix typo in selection name
2024-04-15 17:01:15 +02:00
PiRomant 8c46c94a60 Merge PR #4798 from @PiRomant - Update Hashes field to use contains modifier
update: HackTool - CoercedPotato Execution - Update Hashes field to use contains modifier
update: HackTool - HandleKatz LSASS Dumper Execution - Update Hashes field to use contains modifier
update: HackTool - SysmonEOP Execution - Update Hashes field to use contains modifier
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 16:43:49 +02:00
frack113 045a9a5faa Merge PR #4803 from @frack113 - Update regex based rules
update: Invoke-Obfuscation CLIP+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR+ Launcher - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Stdin - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Use Clip - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell Module - Remove unnecessary starting wildcard
update: Invoke-Obfuscation CLIP+ Launcher - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR+ Launcher - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Stdin - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation Via Use Clip - Powershell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - PowerShell - Remove unnecessary starting wildcard
update: Invoke-Obfuscation STDIN+ Launcher - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation VAR+ Launcher - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation Via Stdin - Update rule to use regex for better accuracy in CLI
update: Invoke-Obfuscation Via Use Clip - Update rule to use regex for better accuracy in CLI 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-15 16:37:15 +02:00
Swachchhanda Shrawan Poudel b40d86599c Merge PR #4806 from @swachchhanda000 - Potential KeyScrambler.exe DLL Side-loading
new: Potential KeyScrambler.exe DLL Side-loading

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:58:20 +02:00
frack113 691dca6fd2 Merge PR #4808 from @frack113 - FP Bad practice GPO
fix: Windows Binaries Write Suspicious Extensions - Add new filter for when "bat" or "powershell" scripts are written via GPO to run at startup.

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:43:35 +02:00
frack113 8687ba8ce6 Merge PR #4813 from @frack113 - Add Image to avoid FP
fix: File And SubFolder Enumeration Via Dir Command - Fix false positive with Firefox and similar CLI apps.
---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-04-15 13:42:32 +02:00
frack113 c21a4e10b8 Merge PR #4807 from @frack113 - Update ATT&CK tags
chore: update ATT&CK tags for `Active Directory Structure Export Via Csvde.EXE`
2024-04-15 10:46:47 +02:00
Mohamed Ashraf f21281ab29 Merge PR #4815 from - Add new malware user-Agent 2024-04-15 10:26:56 +02:00
phantinuss 9078b857a1 Merge PR #4805 from @phantinuss - fix: FP with chocolatey shimgen tool
fix: Dynamic .NET Compilation Via Csc.EXE - FP with chocolatey
2024-04-09 12:34:37 +02:00
phantinuss 4319f5807f Merge PR #4802 from @phantinuss - FP Fixes
fix: Windows Binaries Write Suspicious Extensions - fix selection
fix: Rundll32 Execution With Uncommon DLL Extension - add optional filter for MS Edge update
2024-04-05 08:47:18 +02:00
phantinuss 6505e72604 Merge PR #4797 from @phantinuss - fix: filter PS1 policy check for AppLocker mode
fix: Windows Binaries Write Suspicious Extensions - filter PS1 policy check for AppLocker mode
2024-04-03 10:08:50 +02:00
phantinuss 3e389b1ffd Merge PR #4788 from @phantinuss - fix: regularly loaded by wsmprovhost.exe
update: Suspicious Volume Shadow Copy VSS_PS.dll Load - regularly loaded by wsmprovhost.exe
2024-04-02 09:27:58 +02:00
github-actions[bot] a8e1ecd658 Merge PR #4791 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-04-01 15:14:10 +02:00
Nasreddine Bencherchali f0395b815b Merge PR #4774 from @nasbench - Fix and update multiple rules
Create Release / Create Release (push) Has been cancelled
fix: EVTX Created In Uncommon Location - Reduce level and remove filters
fix: Files With System Process Name In Unsuspected Locations - Add additional paths
fix: New RUN Key Pointing to Suspicious Folder
new: CVE-2024-1212 Exploitation - Progress Kemp LoadMaster Unauthenticated Command Injection
new: MaxMpxCt Registry Value Changed
update: Potentially Suspicious CMD Shell Output Redirect - Enhance logic
update: Suspicious Command Patterns In Scheduled Task Creation - Enhance logic

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-03-26 19:09:21 +01:00
Leo Tsaousis 0d63f52ff5 Merge PR #4694 from @LAripping - Add native Kubernetes detections
new: Container With A hostPath Mount Created
new: Creation Of Pod In System Namespace
new: Deployment Deleted From Kubernetes Cluster
new: Kubernetes Events Deleted
new: Kubernetes Secrets Enumeration
new: New Kubernetes Service Account Created
new: Potential Remote Command Execution In Pod Container
new: Potential Sidecar Injection Into Running Deployment
new: Privileged Container Deployed
new: RBAC Permission Enumeration Attempt 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-26 18:26:46 +01:00
cyb3rjy0t 16d8345ca7 Merge PR #4725 from @cyb3rjy0t - Add new Azure AD rules
new: Certificate-Based Authentication Enabled
new: New Root Certificate Authority Added 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-26 18:25:59 +01:00
Nasreddine Bencherchali 8cbcaea48a Merge PR #4783 from @nasbench - Update registry rules logic and fix some false positives
fix: New TimeProviders Registered With Uncommon DLL Name - Add new legitimate entry to avoid FPs
new: Service Binary in User Controlled Folder
remove: Adwind RAT / JRAT - Registry
remove: Service Binary in Uncommon Folder
update: Add Port Monitor Persistence in Registry - Update logic to avoid hardcoded HKLM values
update: Change Winevt Channel Access Permission Via Registry - Update logic to avoid hardcoded HKLM values
update: CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry - Add more entries to increase coverage and update metadata information
update: Default RDP Port Changed to Non Standard Port - Update logic to avoid hardcoded HKLM values
update: Disable Administrative Share Creation at Startup - Update logic to avoid hardcoded HKLM values
update: Disable Microsoft Defender Firewall via Registry - Update logic to avoid hardcoded HKLM values
update: Disable Windows Event Logging Via Registry - Update logic to avoid hardcoded HKLM values
update: Displaying Hidden Files Feature Disabled - Update logic to avoid hardcoded HKLM values
update: FlowCloud Registry Marker - Update logic to avoid hardcoded HKLM values
update: New PortProxy Registry Entry Added - Update logic to avoid hardcoded HKLM values
update: Potential CobaltStrike Service Installations - Registry - Update logic to avoid hardcoded HKLM values
update: Register New IFiltre For Persistence - Update logic to avoid hardcoded HKLM values
update: Registry Persistence via Service in Safe Mode - Update logic to avoid hardcoded HKLM values
update: Run Once Task Configuration in Registry - Update logic to avoid hardcoded HKLM values
update: Security Support Provider (SSP) Added to LSA Configuration - Update logic to avoid hardcoded HKLM values
update: ServiceDll Hijack - Update logic to avoid hardcoded HKLM values
update: Sysmon Driver Altitude Change - Update logic to avoid hardcoded HKLM values
update: Windows Defender Service Disabled - Registry - Update logic to avoid hardcoded HKLM values

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-03-26 13:28:49 +01:00
xiangchen96 961932ee3f Merge PR #4780 from @xiangchen96 - Minor fix for ip lookup rules
update: Suspicious DNS Query for IP Lookup Service APIs - Fix ip.cn
update: Suspicious Network Connection to IP Lookup Service APIs - Fix ip.cn
2024-03-22 12:24:22 +01:00
xiangchen96 759e224a90 Merge PR #4777 from xiangchen96 - add IP lookup services
update: Suspicious DNS Query for IP Lookup Service APIs - Add new domains
update: Suspicious Network Connection to IP Lookup Service APIs - Add new domains

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2024-03-21 10:13:22 +01:00
security-companion ba2baa1cec Merge PR #4776 from @security-companion - Fix broken reference links
chore: fix some broken reference links

Thanks: @security-companion
2024-03-21 02:38:12 +01:00
frack113 b24da5c685 Merge PR #4771 from @frack113 - Fix false positive found in testing
update: Uncommon Outbound Kerberos Connection - Security - Update filter to include device type paths and reduce the level to "medium"
update: Uncommon Outbound Kerberos Connection - Update filters to include tomcat and reduce the level to "medium"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-03-18 12:00:59 +01:00
Josh 68511f711f Merge PR #4759 from @joshnck - Add new rules covering incoming TeamViewer connection activity
new: Remote Access Tool - Team Viewer Session Started On Linux Host
new: Remote Access Tool - Team Viewer Session Started On MacOS Host
new: Remote Access Tool - Team Viewer Session Started On Windows Host 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-15 21:41:29 +01:00
frack113 33bed27a78 Merge PR #4767 from @frack113 - Update additional rules to use the windash modifier
update: Diskshadow Script Mode Execution - Update rule to use the windash modifier
update: IIS Native-Code Module Command Line Installation - Update rule to use the windash modifier
update: Replace.exe Usage - Update rule to use the windash modifier
update: Potential Arbitrary Command Execution Using Msdt.EXE - Update rule to use the windash modifier
update: Suspicious Cabinet File Execution Via Msdt.EXE - Update rule to use the windash modifier
update: DllUnregisterServer Function Call Via Msiexec.EXE - Update rule to use the windash modifier
update: Suspicious Msiexec Execute Arbitrary DLL - Update rule to use the windash modifier
update: Msiexec Quiet Installation - Update rule to use the windash modifier
update: Suspicious Msiexec Quiet Install From Remote Location - Update rule to use the windash modifier
update: Suspicious Response File Execution Via Odbcconf.EXE - Update rule to use the windash modifier
update: Changing Existing Service ImagePath Value Via Reg.EXE - Update rule to use the windash modifier
update: Exports Critical Registry Keys To a File - Update rule to use the windash modifier
update: Exports Registry Key To a File - Update rule to use the windash modifier
update: Imports Registry Key From a File - Update rule to use the windash modifier
update: Imports Registry Key From an ADS - Update rule to use the windash modifier
update: Potential Regsvr32 Commandline Flag Anomaly - Update rule to use the windash modifier
update: Capture Credentials with Rpcping.exe - Update rule to use the windash modifier
update: Potential Execution of Sysinternals Tools - Update rule to use the windash modifier
update: Kernel Memory Dump Via LiveKD - Update rule to use the windash modifier
update: Potential LSASS Process Dump Via Procdump - Update rule to use the windash modifier
update: Sysmon Configuration Update - Update rule to use the windash modifier
update: Uninstall Sysinternals Sysmon - Update rule to use the windash modifier
update: Loaded Module Enumeration Via Tasklist.EXE - Update rule to use the windash modifier
2024-03-15 21:40:15 +01:00
frack113 6abf058185 Merge PR #4765 from @frack113 - Update additional rules to use the cidr modifier
update: Communication To Uncommon Destination Ports - Add link-local address range
update: Dfsvc.EXE Network Connection To Non-Local IPs - Update rule to use cidr modifier
update: Microsoft Sync Center Suspicious Network Connections - Add link-local address range
update: Network Connection Initiated By PowerShell Process - Update rule to use cidr modifier
update: Office Application Initiated Network Connection To Non-Local IP - Update rule to use cidr modifier
update: Outbound Network Connection To Public IP Via Winlogon - Add link-local address range
update: Potential CVE-2023-23397 Exploitation Attempt - SMB - Update rule to use cidr modifier
update: Potentially Suspicious Malware Callback Communication - Add link-local address range
update: Potentially Suspicious Wuauclt Network Connection - Update rule to use cidr modifier
update: Publicly Accessible RDP Service - Add link-local address range
update: RDP Over Reverse SSH Tunnel - Update rule to use cidr modifier
update: Rundll32 Internet Connection - Add link-local address range
update: Script Initiated Connection to Non-Local Network - Update rule to use cidr modifier
update: Search-ms and WebDAV Suspicious Indicators in URL - Add link-local address range
update: Search-ms and WebDAV Suspicious Indicators in URL - Add link-local address range
update: WebDav Put Request - Update rule to use cidr modifier

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-13 14:51:21 +01:00
Kien a29064f48b Merge PR #4764 from @kietamin - Fix incorrect use of "modifier"
fix: Microsoft VBA For Outlook Addin Loaded Via Outlook - Fix incorrect use of "modifier"
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-12 12:40:49 +01:00
Nasreddine Bencherchali 1758511a2e Merge PR #4762 from @nasbench - Fix false positives found in testing
Create Release / Create Release (push) Has been cancelled
fix: Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process - Add multiple new FP filters seen in the wild
fix: Potential System DLL Sideloading From Non System Locations - Add multiple new FP filters seen in the wild
new: CrackMapExec File Indicators
remove: CrackMapExec File Creation Patterns
remove: Suspicious Epmap Connection
2024-03-11 16:58:55 +01:00
Nasreddine Bencherchali ce7b111f92 Merge PR #4761 from @nasbench - Update rules to use CIDR modifier
chore: update multiple rules to use the cidr modifier
 
---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-03-11 14:33:00 +01:00
Mohamed Ashraf 4c3eb7a2ff Merge PR #4760 from @X-Junior - Add new rule Renamed NirCmd.EXE Execution
new: Renamed NirCmd.EXE Execution 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-11 13:46:55 +01:00
frack113 48baf1187b Merge PR #4752 from @frack113 - Update rules to use the windash modifier
update: File Enumeration Via Dir Command - Update logic to use a wildcard in addition, for better accuracy.
chore: update multiple rules to use the windash modifier 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-11 12:01:30 +01:00
Josh Brower eac04262c2 Merge PR #4695 from @defensivedepth - Add new rules based on OpenCanary tooling
new: OpenCanary - FTP Login Attempt
new: OpenCanary - GIT Clone Request
new: OpenCanary - HTTP GET Request
new: OpenCanary - HTTP POST Login Attempt
new: OpenCanary - HTTPPROXY Login Attempt
new: OpenCanary - MSSQL Login Attempt Via SQLAuth
new: OpenCanary - MSSQL Login Attempt Via Windows Authentication
new: OpenCanary - MySQL Login Attempt
new: OpenCanary - NTP Monlist Request
new: OpenCanary - REDIS Action Command Attempt
new: OpenCanary - SIP Request
new: OpenCanary - SMB File Open Request
new: OpenCanary - SNMP OID Request
new: OpenCanary - SSH Login Attempt
new: OpenCanary - SSH New Connection Attempt
new: OpenCanary - Telnet Login Attempt
new: OpenCanary - TFTP Request
new: OpenCanary - VNC Connection Attempt 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-08 16:24:19 +01:00
tr0mb1r bcedce923f Merge PR #4730 from @tr0mb1r - Add Active Directory Certificate Services Denied Certificate Enrollment Request
new: Active Directory Certificate Services Denied Certificate Enrollment Request 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-03-08 01:33:56 +01:00