EXPLORE

EXPLORE DETECTIONS

🔍
3,115 detections found

Cisco BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing

T1078T1110T1557
Sigmalow

Cisco Clear Logs

Clear command history in network OS which is used for defense evasion

T1070.003
Sigmahigh

Cisco Collect Data

Collect pertinent data from the configuration files

T1087.001T1552.001T1005
Sigmalow

Cisco Crypto Commands

Show when private keys are being exported from the device, or when new certificates are installed

T1553.004T1552.004
Sigmahigh

Cisco Denial of Service

Detect a system being shutdown or put into different boot mode

T1495T1529T1565.001
Sigmamedium

Cisco Disabling Logging

Turn off logging locally or remote

T1562.001
Sigmahigh

Cisco Discovery

Find information about network devices that is not stored in config files

T1083T1201T1057T1018T1082+4
Sigmalow

Cisco Duo Successful MFA Authentication Via Bypass Code

Detects when a successful MFA authentication occurs due to the use of a bypass code. A bypass code is a temporary passcode created by an administrator for a specific user to access a Duo-protected application. These are generally used as "backup codes," so that enrolled users who are having problems with their mobile devices (e.g., mobile service is disrupted, the device is lost or stolen, etc.) or who temporarily can't use their enrolled devices (on a plane without mobile data services) can still access their Duo-protected systems.

Sigmamedium

Cisco File Deletion

See what files are being deleted from flash file systems

T1070.004T1561.001T1561.002
Sigmamedium

Cisco LDP Authentication Failures

Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels

T1078T1110T1557
Sigmalow

Cisco Local Accounts

Find local accounts being created or modified as well as remote authentication configurations

T1136.001T1098
Sigmahigh

Cisco Modify Configuration

Modifications to a config that will serve an adversary's impacts or persistence

T1490T1505T1565.002T1053
Sigmamedium

Cisco Show Commands Input

See what commands are being input into the device by other people, full credentials can be in the history

T1552.003
Sigmamedium

Cisco Sniffing

Show when a monitor or a span/rspan is setup or modified

T1040
Sigmamedium

Cisco Stage Data

Various protocols maybe used to put data on the device for exfil or infil

T1074T1105T1560.001
Sigmalow

Classes Autorun Keys Modification

Detects modification of autostart extensibility point (ASEP) in registry.

T1547.001
Sigmamedium

Clear Linux Logs

Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion

T1070.002
Sigmamedium

Clear or Disable Kernel Ring Buffer Logs via Syslog Syscall

Detects the use of the `syslog` syscall with action code 5 (SYSLOG_ACTION_CLEAR), (4 is SYSLOG_ACTION_READ_CLEAR and 6 is SYSLOG_ACTION_CONSOLE_OFF) which clears the kernel ring buffer (dmesg logs). This can be used by attackers to hide traces after exploitation or privilege escalation. A common technique is running `dmesg -c`, which triggers this syscall internally.

T1070.002
Sigmamedium

Clear PowerShell History - PowerShell

Detects keywords that could indicate clearing PowerShell history

T1070.003
Sigmamedium

Clear PowerShell History - PowerShell Module

Detects keywords that could indicate clearing PowerShell history

T1070.003
Sigmamedium

Clearing Windows Console History

Identifies when a user attempts to clear console history. An adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion.

T1070T1070.003
Sigmahigh

Cleartext Protocol Usage

Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels. Ensure that an encryption is used for all sensitive information in transit. Ensure that an encrypted channels is used for all administrative account access.

Sigmalow

Clfs.SYS Loaded By Process Located In a Potential Suspicious Location

Detects Clfs.sys being loaded by a process running from a potentially suspicious location. Clfs.sys is loaded as part of many CVEs exploits that targets Common Log File.

T1059
Sigmamedium

ClickOnce Trust Prompt Tampering

Detects changes to the ClickOnce trust prompt registry key in order to enable an installation from different locations such as the Internet.

T1112
Sigmamedium
PreviousPage 14 of 130Next