Title : Cisco BGP Authentication Failures
Rule id : 56fa3cd6-f8d6-4520-a8c7-607292971886
Url |
---|
Title : Cisco Clear Logs
Rule id : ceb407f6-8277-439b-951f-e4210e3ed956
Title : Cisco Collect Data
Rule id : cd072b25-a418-4f98-8ebc-5093fb38fe1a
Title : Cisco Crypto Commands
Rule id : 1f978c6a-4415-47fb-aca5-736a44d7ca3d
Url | |
---|---|
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec-a1-cr-book_chapter_0111.html | pdf/2641cfe9dd79570c6b15bd5b7635c21893faf35bba956d38d8c89ba642fc19dc.pdf |
Title : Cisco Disabling Logging
Rule id : 9e8f6035-88bf-4a63-96b6-b17c0508257e
Url |
---|
Title : Cisco Discovery
Rule id : 9705a6a1-6db6-4a16-a987-15b7151e299b
Url | |
---|---|
https://www.cisco.com/c/en/us/td/docs/server_nw_virtual/2-5_release/command_reference/show.html | pdf/e814ad3b206561fd7a83f7d90d7abeb09e47d31cbc918482948acf28cc92814a.pdf |
Title : Cisco Denial of Service
Rule id : d94a35f0-7a29-45f6-90a0-80df6159967c
Url |
---|
Title : Cisco File Deletion
Rule id : 71d65515-c436-43c0-841b-236b1f32c21e
Url |
---|
Title : Cisco Show Commands Input
Rule id : b094d9fb-b1ad-4650-9f1a-fb7be9f1d34b
Url |
---|
Title : Cisco Local Accounts
Rule id : 6d844f0f-1c18-41af-8f19-33e7654edfc3
Url |
---|
Title : Cisco Modify Configuration
Rule id : 671ffc77-50a7-464f-9e3d-9ea2b493b26b
Url |
---|
Title : Cisco Stage Data
Rule id : 5e51acb2-bcbe-435b-99c6-0e3cd5e2aa59
Url |
---|
Title : Cisco Sniffing
Rule id : b9e1f193-d236-4451-aaae-2f3d2102120d
Url |
---|
Title : Cisco Duo Successful MFA Authentication Via Bypass Code
Rule id : 6f7e1c10-2dc9-4312-adb6-9574ff09a5c8
Title : Cisco LDP Authentication Failures
Rule id : 50e606bf-04ce-4ca7-9d54-3449494bbd4b
Url |
---|
Title : Exploitation Indicators Of CVE-2023-20198
Rule id : 2ece8816-b7a0-4d9b-b0e8-ae7ad18bc02b
Title : HackTool - CACTUSTORCH Remote Thread Creation
Rule id : 2e4e488a-6164-4811-9ea1-f960c7359c40
Title : HackTool - Potential CobaltStrike Process Injection
Rule id : 6309645e-122d-4c5b-bb2b-22e4f9c2fa42
Title : Remote Thread Created In KeePass.EXE
Rule id : 77564cc2-7382-438b-a7f6-395c2ae53b9a
Title : CreateRemoteThread API and LoadLibrary
Rule id : 052ec6f6-1adc-41e6-907a-f1c813478bee
Url | |
---|---|
https://threathunterplaybook.com/hunts/windows/180719-DLLProcessInjectionCreateRemoteThread/notebook.html | pdf/f990bd14d8e1df0fb3fb4a16af53282199dec47e4b04efb6d10226a327585660.pdf |
Title : Potential Bumblebee Remote Thread Creation
Rule id : 994cac2b-92c2-44bf-8853-14f6ca39fbda
Url | |
---|---|
https://thedfirreport.com/2022/09/26/bumblebee-round-two/ | pdf/6674231aab57d99d2c26780e67629657f514caf056d1782dac35cf6c7f57ecb2.pdf |
Title : Remote Thread Creation In Mstsc.Exe From Suspicious Location
Rule id : c0aac16a-b1e7-4330-bab0-3c27bb4987c7
Title : Remote Thread Creation Via PowerShell
Rule id : eeb2e3dc-c1f4-40dd-9bd5-149ee465ad50
Url | |
---|---|
https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse | pdf/0d238d8b4247a38432961d12fba04155db8526642f40d0aaf0c796cd13b85d64.pdf |
Title : Potential Credential Dumping Attempt Via PowerShell Remote Thread
Rule id : fb656378-f909-47c1-8747-278bf09f4f4f
Url | |
---|---|
https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse | pdf/0d238d8b4247a38432961d12fba04155db8526642f40d0aaf0c796cd13b85d64.pdf |
Title : Remote Thread Creation Via PowerShell In Uncommon Target
Rule id : 99b97608-3e21-4bfe-8217-2a127c396a0e
Url | |
---|---|
https://www.fireeye.com/blog/threat-research/2018/06/bring-your-own-land-novel-red-teaming-technique.html | pdf/0290911ac17eb6b9bd95ab228ba6632f060feb233a6322645c959855d26a36cc.pdf |
Title : Password Dumper Remote Thread in LSASS
Rule id : f239b326-2f41-4d6b-9dfa-c846a60ef505
Url | |
---|---|
https://jpcertcc.github.io/ToolAnalysisResultSheet/details/WCE.htm | pdf/65622f579a7ec399cc204cf80ad30e60fdc23aa12b3f3646010bc5e1e49b5094.pdf |
Title : Rare Remote Thread Creation By Uncommon Source Image
Rule id : 02d1d718-dd13-41af-989d-ea85c7fab93f
Url | |
---|---|
https://lolbas-project.github.io | pdf/6ff4a3dea600d4a3da5e72f9a5ca22e3fb6d24b13a99840e90c5cec369c5bc39.pdf |
Title : Remote Thread Created In Shell Application
Rule id : a9d4d3fa-8fc0-41bc-80b1-30b9fda79d6f
Title : Remote Thread Creation By Uncommon Source Image
Rule id : 66d31e5f-52d6-40a4-9615-002d3789a119
Url | |
---|---|
https://lolbas-project.github.io | pdf/6ff4a3dea600d4a3da5e72f9a5ca22e3fb6d24b13a99840e90c5cec369c5bc39.pdf |
Title : Remote Thread Creation In Uncommon Target Image
Rule id : a1a144b7-5c9b-4853-a559-2172be8d4a03
Title : Remote Thread Creation Ttdinject.exe Proxy
Rule id : c15e99a3-c474-48ab-b9a7-84549a7a9d16
Url | |
---|---|
https://lolbas-project.github.io/lolbas/Binaries/Ttdinject/ | pdf/f9f1c4bf6e5102389ff665c836c199c0ecf2607de83c7fb52b58e76dea2e3eb4.pdf |
Title : Hidden Executable In NTFS Alternate Data Stream
Rule id : b69888d4-380c-45ce-9cf9-d9ce46e67821
Url | |
---|---|
https://twitter.com/0xrawsec/status/1002478725605273600?s=21 | pdf/7da8166b7ec1e054fbea3243ce3fd1743acae7ed60d63c406a01aa3761da5090.pdf |
Title : Creation Of a Suspicious ADS File Outside a Browser Download
Rule id : 573df571-a223-43bc-846e-3f98da481eca
Title : Suspicious File Download From File Sharing Websites - File Stream
Rule id : 52182dfb-afb7-41db-b4bc-5336cb29b464
Title : Unusual File Download From File Sharing Websites - File Stream
Rule id : ae02ed70-11aa-4a22-b397-c0d0e8f6ea99
Title : HackTool Named File Stream Created
Rule id : 19b041f6-e583-40dc-b842-d6fa8011493f
Title : Exports Registry Key To an Alternate Data Stream
Rule id : 0d7a9363-af70-4e7b-a3b7-1a176b7fbe84
Title : Unusual File Download from Direct IP Address
Rule id : 025bd229-fd1f-4fdb-97ab-20006e1a5368
Title : Potential Suspicious Winget Package Installation
Rule id : a3f5c081-e75b-43a0-9f5b-51f26fe5dba2
Url | |
---|---|
https://github.com/nasbench/Misc-Research/tree/b9596e8109dcdb16ec353f316678927e507a5b8d/LOLBINs/Winget | pdf/934415afe6db703b32a687956220823295c5dedc50d1636b0392ead165642170.pdf |
Title : Potentially Suspicious File Download From ZIP TLD
Rule id : 0bb4bbeb-fe52-4044-b40c-430a04577ebe