Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DLUX_4 - Updating detections and adding a new one #3140

Open
wants to merge 29 commits into
base: develop
Choose a base branch
from
Open

Conversation

dluxtron
Copy link
Collaborator

@dluxtron dluxtron commented Sep 25, 2024

DL PR

Updates to existing ESCU Detections

detect_large_outbound_icmp_packets.yml

  • Added Risk Message
  • Updated Risk Object from dest to dest_ip
  • Added another risk object for src_ip
  • Added the renamed field to the values commands
  • Added filtering for dest_ips to the where clause of the tstats command
  • Added iplocation

detect_outbound_smb_traffic.yml

  • All_Traffic.direction is not populated by all firewall logs, added internal to external logic to the where clause of the tstats instaed
  • Added dest_port and dest_ip to the by clause of the tstats for better filtering & RBA experience
  • Added iplocation

remote_desktop_network_bruteforce.yml

  • Updated search logic to use port 3389 as well (customer didn't have the RDP app resolving)
  • Added filtering for allowed traffic only - inbound blocked traffic was triggering this rule
  • Added src as a risk object

remote_desktop_network_traffic.yml

  • Added risk message

smb_traffic_spike.yml

  • Added risk message
  • Added src as risk object

high_volume_of_bytes_out_to_url.yml

  • Moved from Network folder to web folder

java_class_file_download_by_java_user_agent.yml

  • Moved from Network folder to web folder
  • Added missing summaries_only macro

multiple_archive_files_http_post_traffic.yml

  • Moved from Network folder to web folder

plain_http_post_exfiltrated_data.yml

  • Moved from Network folder to web folder

unusually_long_content_type_length.yml

  • Moved from Network folder to web folder
  • Rewrote detection to use Web Datamodel
  • Added risk message
  • Added risk object for src

aws_multiple_users_failing_to_authenticate_from_ip.yml

  • Added missing where clause

kerberoasting_spn_request_with_rc4_encryption.yml

  • Added user field to the SPL
  • Moved the risk object from the DC (dest) to the user
  • Added details on how to implement to use this as a risk rule in noisy environments

unusual_number_of_kerberos_service_tickets_requested.yml

  • Added user field to the SPL
  • Added user to risk object
  • Increased threshold to min 6 service accounts

windows_driver_load_non_standard_path.yml

  • Moved filtering to regex statement to anchor to known folder locations
  • Easy to bypass this detection using common foldernames

detect_password_spray_attempts.yml

  • Fixed logic (this hurt my brain), should be good now.

detect_distributed_password_spray_attempts.yml

  • Same as above

windows_ad_serviceprincipalname_added_to_domain_account.yml

  • updated base search to only focus on user accounts, this was triggering loads of false positives in customer environment
  • Adding a SPN to a computer account or GMSA would be near pointless anyway due to the long complex passwords which will be near impossible to crack with today's technology

wineventlog_task_scheduler macro

  • was set to wineventlog:security, updated to correct task scheduler source

Added new detection

internal_horizontal_port_scan_nmap_top_20.yml
Same as the other internal horizontal port scan, but focused on the nmap top 20.

@dluxtron dluxtron changed the title Updating detections and adding a new one DLUX_4 - Updating detections and adding a new one Oct 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants