Files
blue-team-tools/rules/windows/builtin
Maxime Thiebaut 73a6428345 Update the NTLM downgrade registry paths
Recent windows versions rely on the ["MSV1_0" authentication package](https://docs.microsoft.com/en-us/windows/win32/secauthn/msv1-0-authentication-package). Production environment tests have shown that NTLM downgrade attacks can be performed as detected by this rule although some of the registry keys are located in an "Lsa" subkey ("MSV1_0"). This commit introduces additionnal wildcards to handle these cases to ensure the previous detection rules are still included.
2020-04-07 17:14:45 +02:00
..
2019-11-12 23:12:27 +01:00
2020-01-24 15:31:06 +01:00
2019-11-12 23:12:27 +01:00
2019-11-12 23:12:27 +01:00
2020-02-20 23:00:16 +01:00
2020-02-16 23:24:00 +01:00
2019-11-12 23:12:27 +01:00
2020-02-20 23:51:12 +01:00
2019-11-12 23:12:27 +01:00
2020-03-26 17:03:33 +01:00
2020-01-11 00:11:27 +01:00
2019-11-12 23:12:27 +01:00
2020-02-20 23:00:16 +01:00