-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
3 New rules #5747
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
3 New rules #5747
Conversation
This rule detects changes to the msDS-AllowedToActOnBehalfOfOtherIdentity attribute in Active Directory, which may indicate potentially malicious RBCD configuration.
Updated references for SSH tunneling detection.
Updated the date for the win_security_kerberos_constrained_delegation rule.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @louiselalanne 👋
It looks like this is your first pull request on the Sigma rules repository!
Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.
Thanks again, and welcome to the Sigma community! 😃
|
Hey @louiselalanne can you please provide an example event log for the plink / ssh execution as well as one for the susp ticket. |
|
hi @nasbench, the log for suspicious kerberos: |
|
thanks for your time (: |
Removed selection_flags condition for SSH tunneling.
Summary of the Pull Request
This PR adds three new detection rules for common attack techniques:
These rules help detect privilege escalation, persistence, and C2 communication attempts commonly used in post-exploitation scenarios.
Changelog
new: Suspicious Kerberos Ticket Request - S4U2Proxy
new: Kerberos Constrained Delegation
new: SSH Tunneling via SSH Client on Windows
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions