Skip to content

Commit 8259a2e

Browse files
authored
Removed duplicate, added new network rules
- Removed my duplicate entry 'powershell.exe' - Added new remote access tools network connection rules (to see where an attacker came from and where he jumps to) - Added often exploited services with dedicated service executable network connection rules
1 parent cc2d839 commit 8259a2e

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

sysmonconfig-export.xml

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,17 @@
186186
<Image condition="image">sc.exe</Image> <!--Microsoft:Windows: Remotely change Windows service settings from command line | Credit @ion-storm -->
187187
<Image condition="image">wmic.exe</Image> <!--Microsoft:WindowsManagementInstrumentation: Credit @Cyb3rOps [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
188188
<Image condition="image">wscript.exe</Image> <!--Microsoft:WindowsScriptingHost: | Credit @arekfurt -->
189-
<Image condition="image">powershell.exe</Image> <!--Microsoft:WindowsPowerShell: | Credit @Cyb3rOps -->
189+
<!--Relevant 3rd Party Tools: Remote Access-->
190+
<Image condition="image">psexec.exe</Image> <!--Sysinternals:PsExec client side | Credit @Cyb3rOps -->
191+
<Image condition="image">psexesvc.exe</Image> <!--Sysinternals:PsExec server side | Credit @Cyb3rOps -->
192+
<Image condition="image">vnc.exe</Image> <!-- VNC client | Credit @Cyb3rOps -->
193+
<Image condition="image">vncviewer.exe</Image> <!-- VNC client | Credit @Cyb3rOps -->
194+
<Image condition="image">vncservice.exe</Image> <!-- VNC server | Credit @Cyb3rOps -->
195+
<Image condition="image">winexesvc.exe</Image> <!-- Winexe service executable | Credit @Cyb3rOps -->
196+
<Image condition="image">\AA_v</Image> <!-- Ammy Admin service executable (e.g. AA_v3.0.exe AA_v3.5.exe ) | Credit @Cyb3rOps -->
197+
<!-- Often exploited services -->
198+
<Image condition="image">omniinet.exe</Image> <!-- HP Data Protector https://www.cvedetails.com/vulnerability-list/vendor_id-10/product_id-20499/HP-Data-Protector.html | Credit @Cyb3rOps -->
199+
<Image condition="image">hpsmhd.exe</Image> <!-- HP System Management Homepage https://www.cvedetails.com/vulnerability-list/vendor_id-10/product_id-7244/HP-System-Management-Homepage.html | Credit @Cyb3rOps -->
190200
<!--Ports: Suspicious-->
191201
<DestinationPort condition="is">22</DestinationPort> <!--SSH protocol-->
192202
<DestinationPort condition="is">23</DestinationPort> <!--Telnet protocol-->

0 commit comments

Comments
 (0)