EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

JexBoss Command Sequence

Detects suspicious command sequence that JexBoss

T1059.004
Sigmahigh

JNDIExploit Pattern

Detects exploitation attempt using the JNDI-Exploit-Kit

T1190
Sigmahigh

JScript Compiler Execution

Detects the execution of the "jsc.exe" (JScript Compiler). Attacker might abuse this in order to compile JScript files on the fly and bypassing application whitelisting.

T1127
Sigmalow

Juniper BGP Missing MD5

Detects juniper BGP missing MD5 digest. Which may be indicative of brute force attacks to manipulate routing.

T1078T1110T1557
Sigmalow

JXA In-memory Execution Via OSAScript

Detects possible malicious execution of JXA in-memory via OSAScript

T1059.002T1059.007
Sigmahigh

Kaspersky Endpoint Security Stopped Via CommandLine - Linux

Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

T1562.001
Sigmahigh

Kavremover Dropped Binary LOLBIN Usage

Detects the execution of a signed binary dropped by Kaspersky Lab Products Remover (kavremover) which can be abused as a LOLBIN to execute arbitrary commands and binaries.

T1127
Sigmahigh

Kerberoasting Activity - Initial Query

This rule will collect the data needed to start looking into possible kerberoasting activity. Further analysis or computation within the query is needed focusing on requests from one specific host/IP towards multiple service names within a time period of 5 seconds. You can then set a threshold for the number of requests and time between the requests to turn this into an alert.

T1558.003
Sigmamedium

Kerberos Manipulation

Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.

T1212
Sigmahigh

Kerberos Network Traffic RC4 Ticket Encryption

Detects kerberos TGS request using RC4 encryption which may be indicative of kerberoasting

T1558.003
Sigmamedium

Kernel Memory Dump Via LiveKD

Detects execution of LiveKD with the "-m" flag to potentially dump the kernel memory

Sigmahigh

KrbRelayUp Service Installation

Detects service creation from KrbRelayUp tool used for privilege escalation in Windows domain environments where LDAP signing is not enforced (the default settings)

T1543
Sigmahigh

Kubernetes Admission Controller Modification

Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.

T1078T1552T1552.007
Sigmamedium

Kubernetes CronJob/Job Modification

Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.

Sigmamedium

Kubernetes Events Deleted

Detects when events are deleted in Kubernetes. An adversary may delete Kubernetes events in an attempt to evade detection.

T1070
Sigmamedium

Kubernetes Rolebinding Modification

Detects when a Kubernetes Rolebinding is created or modified.

Sigmamedium

Kubernetes Secrets Enumeration

Detects enumeration of Kubernetes secrets.

T1552.007
Sigmalow

Kubernetes Secrets Modified or Deleted

Detects when Kubernetes Secrets are Modified or Deleted.

Sigmamedium

Kubernetes Unauthorized or Unauthenticated Access

Detects when a request to the Kubernetes API is rejected due to lack of authorization or due to an expired authentication token being used. This may indicate an attacker attempting to leverage credentials they have obtained.

Sigmalow

Launch Agent/Daemon Execution Via Launchctl

Detects the execution of programs as Launch Agents or Launch Daemons using launchctl on macOS.

T1569.001T1543.001T1543.004
Sigmamedium

Launch-VsDevShell.PS1 Proxy Execution

Detects the use of the 'Launch-VsDevShell.ps1' Microsoft signed script to execute commands.

T1216.001
Sigmamedium

Legitimate Application Dropped Archive

Detects programs on a Windows system that should not write an archive to disk

T1218
Sigmahigh

Legitimate Application Dropped Executable

Detects programs on a Windows system that should not write executables to disk

T1218
Sigmahigh

Legitimate Application Dropped Script

Detects programs on a Windows system that should not write scripts to disk

T1218
Sigmahigh
PreviousPage 46 of 136Next