Skip to content

Commit 1f4135a

Browse files
w0rk3rterrancedejesus
authored andcommitted
[New Rule] Active Directory Forced Authentication from Linux Host - SMB Named Pipes (#3917)
* [New Rule] Active Directory Forced Authentication from Linux Host via SMB Pipes * Update credential_access_forced_authentication_pipes.toml * Update rules/cross-platform/credential_access_forced_authentication_pipes.toml Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com> --------- Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>
1 parent d8f63b3 commit 1f4135a

File tree

1 file changed

+76
-0
lines changed

1 file changed

+76
-0
lines changed
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
[metadata]
2+
creation_date = "2024/07/23"
3+
integration = ["endpoint", "system"]
4+
maturity = "production"
5+
updated_date = "2024/07/23"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Identifies a potential forced authentication using related SMB named pipes. Attackers may attempt to force targets to
11+
authenticate to a host controlled by them to capture hashes or enable relay attacks.
12+
"""
13+
from = "now-9m"
14+
index = ["logs-endpoint.events.network-*", "logs-system.security-*"]
15+
language = "eql"
16+
license = "Elastic License v2"
17+
name = "Active Directory Forced Authentication from Linux Host - SMB Named Pipes"
18+
references = [
19+
"https://github.com/p0dalirius/windows-coerced-authentication-methods",
20+
"https://www.thehacker.recipes/a-d/movement/mitm-and-coerced-authentications",
21+
"https://attack.mitre.org/techniques/T1187/",
22+
]
23+
risk_score = 47
24+
rule_id = "c24e9a43-f67e-431d-991b-09cdb83b3c0c"
25+
setup = """## Setup
26+
27+
This rule uses Elastic Endpoint network events from Linux hosts and system integration events from Domain controllers
28+
for correlation. Both data sources should be collected from the hosts for this detection to work.
29+
30+
The 'Audit Detailed File Share' audit policy must be configured (Success Failure).
31+
Steps to implement the logging policy with Advanced Audit Configuration:
32+
```
33+
Computer Configuration >
34+
Policies >
35+
Windows Settings >
36+
Security Settings >
37+
Advanced Audit Policies Configuration >
38+
Audit Policies >
39+
Object Access >
40+
Audit Detailed File Share (Success,Failure)
41+
```
42+
"""
43+
severity = "medium"
44+
tags = [
45+
"Domain: Endpoint",
46+
"OS: Windows",
47+
"OS: Linux",
48+
"Use Case: Threat Detection",
49+
"Tactic: Credential Access",
50+
"Data Source: Elastic Defend",
51+
"Data Source: Active Directory",
52+
"Use Case: Active Directory Monitoring",
53+
]
54+
timestamp_override = "event.ingested"
55+
type = "eql"
56+
57+
query = '''
58+
sequence with maxspan=15s
59+
[network where host.os.type == "linux" and event.action == "connection_attempted" and destination.port == 445] by host.ip
60+
[file where host.os.type == "windows" and event.code == "5145" and file.name : ("Spoolss", "netdfs", "lsarpc", "lsass", "netlogon", "samr", "efsrpc", "FssagentRpc")] by source.ip
61+
'''
62+
63+
64+
[[rule.threat]]
65+
framework = "MITRE ATT&CK"
66+
[[rule.threat.technique]]
67+
id = "T1187"
68+
name = "Forced Authentication"
69+
reference = "https://attack.mitre.org/techniques/T1187/"
70+
71+
72+
[rule.threat.tactic]
73+
id = "TA0006"
74+
name = "Credential Access"
75+
reference = "https://attack.mitre.org/tactics/TA0006/"
76+

0 commit comments

Comments
 (0)