Skip to content

Commit 263db16

Browse files
authored
author update
1 parent 3536817 commit 263db16

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/endpoint/windows_process_with_netexec_command_line_parameters.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: Windows Process With NetExec Command Line Parameters
22
id: adbff89c-c1f2-4a2e-88a4-b5e645856510
33
version: 1
44
date: '2024-12-19'
5-
author: nobody
5+
author: Steven Dick, Github Community
66
status: production
77
type: TTP
88
description: The following analytic detects the use of NetExec (formally CrackmapExec) a toolset used for post-exploitation enumeration and attack within Active Directory environments through command line parameters. It leverages Endpoint Detection and Response (EDR) data to identify specific command-line arguments associated with actions like ticket manipulation, kerberoasting, and password spraying. This activity is significant as NetExec is used by adversaries to exploit Kerberos for privilege escalation and lateral movement. If confirmed malicious, this could lead to unauthorized access, persistence, and potential compromise of sensitive information within the network.

0 commit comments

Comments
 (0)