Skip to content

Latest commit

 

History

History
32 lines (25 loc) · 991 Bytes

MATCH-S00299.md

File metadata and controls

32 lines (25 loc) · 991 Bytes

Rules: SecurityXploded Tool

Description

Detects the execution of SecurityXploded Tools

Additional Details

Detail Value
Type Templated Match
Category Privilege Escalation
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name SecurityXploded Tool
Summary Expression SecurityXploded Tool detected on host: {{device_hostname}}
Score/Severity Static: 3
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0004, _mitreAttackTactic:TA0006, _mitreAttackTechnique:T1003, _mitreAttackTechnique:T1003.001, _mitreAttackTechnique:T1003.002, _mitreAttackTechnique:T1555, _mitreAttackTechnique:T1555.004

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username