-
-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Add Ligolo-ng tunneling tool detection #5818
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from 1 commit
1c9f505
e849615
5e4efbd
ffb70de
a7bde01
ff55e9d
bddad24
18e200e
e769d9f
b5d2226
d5c71d7
2aa1157
a2e3459
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -0,0 +1,34 @@ | ||||||
| title: Ligolo-ng Tunneling Tool Execution | ||||||
| id: 0074da8e-5b3f-456b-9bf9-70beaf4bfb0d | ||||||
| status: experimental | ||||||
| description: Detects execution of Ligolo-ng agent or proxy, a tunneling tool commonly used for network pivoting in penetration testing and by threat actors | ||||||
| references: | ||||||
| - https://github.com/nicocha30/ligolo-ng | ||||||
| - https://attack.mitre.org/techniques/T1572/ | ||||||
| author: MAB | ||||||
| date: 2025/12/31 | ||||||
swachchhanda000 marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||||||
| tags: | ||||||
| - attack.command_and_control | ||||||
| - attack.t1572 | ||||||
| logsource: | ||||||
| category: process_creation | ||||||
| product: windows | ||||||
| detection: | ||||||
| selection_img: | ||||||
| - Image|endswith: | ||||||
| - '\agent.exe' | ||||||
| - '\proxy.exe' | ||||||
|
||||||
| - '\agent.exe' | |
| - '\proxy.exe' |
These names are also very generic. When writing a rule about hktl,
we try to use the very specific process names, originalfilename or imphash.
In some cases, we also use command lines that may include combinations of flags or any specific strings which is unique to that specific tool only.
Please have a look at other HKTL or PUA rules on the repo for better understanding and make the changes accordingly.
Thanks
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
many tools use that type of cli option.
You can not have a high rule with many FP.
Look at https://github.com/SigmaHQ/sigma/blob/6fe7343bf79306884b05837d5e03bcbcb141ce50/rules/windows/process_creation/proc_creation_win_nltest_recon.yml as example.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This seems like the best option possible, but i think the selection might still be prone to FPS issues? What are your thoughts on this, @nasbench?
Uh oh!
There was an error while loading. Please reload this page.