Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Detects a successful RDP connection via Hydra or Ncrack hacking tools.

Source table → ids.bro.rdp

...

Expand
title

...

SecOpsBroWinLsatUserEnumeration

Detects actors utilizing MS-LSAT Remote protocol to map security SIDs to user accounts.

Source table → ids.bro.dce_rpc

Expand
title

...

SecOpsBroSelfSignedCert

Detects

...

servers responding via SSL or TLS services using self-signed certificates.

Source table → ids.bro.ssl

Expand
titleSecOpsBroSshInteresingHostNameLogin

Detects interesting host name login events. See Bro/Zeek reference for context around interesting hostnames.

Source table → ids.bro.notice

Expand
titleSecOpsRemoteDesktopProtocolScan

Remote Desktop Services Scan from one Entity to Multiple Destinations.

Source table → ids.bro.

...

rdp

Expand
titleSecOpsBroWinDceRpcSamrEnumeration

Detects actors enumerating user accounts in Active Directory via Security Account Manager Remote Protocol (SAMR).

Source table → ids.bro.dce_rpc

Expand
titleSecOpsBroHttpRequestSingleHeader

Detects HTTP requests that contain only a single header.

Source table → ids.bro.http

Expand
titleSecOpsBroSmbFirstSeenShare

Detects the first seen SMB share for an entity. Adversaries may utilize SMB shares to transport files; while not inherently malicious, this event should be reviewed for legitimacy.

Source table → ids.bro.notice

Expand
title

...

SecOpsBroWinDceRpceServiceCall

Detects the creation or deletion of services via RPC remote administration. Actors may create/delete services to establish a greater foothold once inside a network.

Source table → ids.bro.

...

dce_rpc

Expand
title

...

SecOpsBroRdpBruteForceSuccessHydraNcrack

Detects

...

Source table → ids.bro.http

...

titleSecOpsBroSelfSignedCert

...

a successful RDP connection via Hydra or Ncrack hacking tools.

Source table → ids.bro.

...

rdp