LoFP
/
t1190
t1190
Title
Tags
3rd party apache modules - https://bz.apache.org/bugzilla/show_bug.cgi?id=46185
t1190
t1210
sigma
a single port being opened for a new service that is known to be deploying
t1190
aws
sigma
a syntax error in mysql also occurs in non-dynamic (safe) queries if there is an empty in() clause, that may often be the case.
t1190
sql
sigma
access level modifications may be done by a system or network administrator. verify whether the username, hostname, and/or resource name should be making changes in your environment. access level modifications from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
t1190
t1526
azure
elastic
administrators closing unused ports to reduce the attack surface
t1190
aws
sigma
application bugs
t1190
jvm
python
spring
velocity
django
ruby_on_rails
sigma
be aware of potential false positives - legitimate uses of the /webauth_operation.php endpoint may cause benign activities to be flagged.the url in the analytic is specific to a successful attempt to exploit the vulnerability. review contents of the http body to determine if the request is malicious. if the request is benign, add the url to the whitelist or continue to monitor.
t1059
t1105
t1190
web server
splunk
changes to security groups to allow for new services to be deployed
t1190
aws
sigma
creation of a new database that needs new security group rules
t1190
aws
sigma
expected to be continuously seen on systems exposed to the internet
t1190
sigma
exploits that were attempted but unsuccessful.
t1021
t1021.006
t1068
t1190
t1203
t1210
zeek
sigma
false positives are limited.
t1133
t1190
web server
splunk
false positives are not expected, as the detection is based on the presence of web requests to the setupwizard.aspx page, which is not a common page to be accessed by legitimate users. note that the analytic is limited to http post and a status of 200 to reduce false positives. modify the query as needed to reduce false positives or hunt for additional indicators of compromise.
t1190
web proxy
web server
splunk
false positives are not expected, as this detection is based on monitoring http post requests to a specific endpoint with a status code of 200. however, ensure that legitimate requests to the `/wsstatusevents/eventhandler.asmx` endpoint are accounted for in the environment to avoid false positives.
t1190
web server
splunk
false positives are not expected, as this detection is based on the presence of specific uri paths and http methods that are indicative of the cve-2024-27198 vulnerability exploitation. monitor, filter and tune as needed based on organization log sources.
t1190
web server
splunk
false positives are not expected, however, monitor, filter, and tune as needed based on organization log sources. the analytic is restricted to 200 and get requests to specific uri paths, which should limit false positives.
t1190
web server
splunk
false positives are possible and filtering may be required. restrict by assets or filter known jsp files that are common for the environment.
t1133
t1190
endpoint
splunk
false positives are present when the values are set to 1 for utf and lookup. it's possible to raise this to ttp (direct notable) if removal of other_lookups occur and score is raised to 2 (down from 4).
t1133
t1190
t1505
t1505.003
web server
splunk
false positives may be possible, however we restricted it to http status 200 and post requests, based on the poc. upon investigation review the post body for the actual payload - or command - being executed.
t1190
web server
splunk
false positives may be present based on organization use of citrix adc and gateway. filter, or restrict the analytic to citrix devices only.
t1190
web server
splunk
false positives may be present based on organization use of saml utilities. filter, or restrict the analytic to citrix devices only.
t1190
network
splunk
false positives may be present if the activity is blocked or was not successful. filter known vulnerablity scanners. filter as needed.
t1133
t1190
web server
splunk
false positives may be present with legitimate applications. attempt to filter by dest ip or use asset groups to restrict to confluence servers.
t1190
web application
web server
splunk
false positives may be present, as this is based on the admin user accessing the papercut ng instance from a public ip address. filter as needed.
t1133
t1190
web server
splunk
false positives may be present, but most likely not. filter as needed.
t1059
t1133
t1190
endpoint
splunk
false positives may be present, filter as needed.
t1068
t1069.002
t1105
t1133
t1190
t1547.006
t1548
t1548.003
web server
endpoint
splunk
false positives may be present, filtering may be needed. also, restricting to known web servers running iis or sharefile will change this from hunting to ttp.
t1190
network
splunk
false positives may be present, restrict to cisco ios xe devices or perimeter appliances. modify the analytic as needed based on hunting for successful exploitation of cve-2023-20198.
t1190
network
splunk
false positives may be present. modify the query as needed to post, or add additional filtering (based on log source).
t1133
t1190
network
splunk
false positives may occur and filtering may be required. restrict analytic to asset type.
t1133
t1190
web server
splunk
false positives may occur depending on the web server's configuration. if the web server is intentionally configured to utilize the remote shellservlet, then the detections by this analytic would not be considered true positives.
t1190
web server
splunk
false positives may occur if legitimate pswa processes are used for administrative tasks. careful review of the logs is recommended to distinguish between legitimate and malicious activity.
t1190
web server
endpoint
splunk
false positives may occur, therefore utilize the analytic as a jump off point to identifiy potential certificate store errors.
t1190
web server
splunk
false positives should be limited as the analytic is specific to screenconnect path traversal attempts. tune as needed, or restrict to specific hosts if false positives are encountered.
t1190
endpoint
splunk
false positives should be limited as this detection is based on a specific url path and http status code. adjust the search as necessary to fit the environment.
t1190
web server
splunk
false positives should be limited, however tune or filter as needed.
t1190
web application
splunk
false positives will be limited, however tune or modify the query as needed.
t1133
t1190
web server
splunk
false positives will be present based on gateways in use, modify the status field as needed.
t1068
t1133
t1190
t1210
web server
splunk
files generated during installation will generate a lot of noise, so the rule should only be enabled after the fact.
t1190
t1210
windows
elastic
filtering may be required in some instances, filter as needed.
t1190
web server
splunk
filtering may be required on internal developer build systems or classify assets as web facing and restrict the analytic based on asset type.
t1133
t1190
endpoint
splunk
get requests will be noisy and need to be filtered out or removed from the query based on volume. restrict analytic to known publically facing fortigates, or run analytic as a hunt until properly tuned. it is also possible the user agent may be filtered on report runner or node.js only for the exploit, however, it is unknown at this if other user agents may be used.
t1133
t1190
network
splunk
if teamcity is not in use, this analytic will not return results. monitor and tune for your environment.
t1190
web server
splunk
if the application expects to work with xml there may be parsing issues that don't necessarily mean xxe.
t1190
jvm
sigma
if there is a vulnerablility scannner looking for log4shells this will trigger, otherwise likely to have low false positives.
t1133
t1190
endpoint
splunk
if ws_ftp server is not in use, this analytic will not return results. monitor and tune for your environment. note the metasploit module is focused on only hitting /aht/ and not the full /aht/ahtapiservice.asmx/authuser url.
t1190
web server
splunk
if you have front-facing proxies that provide authentication and tls, this rule would need to be tuned to eliminate the source ip address of your reverse-proxy.
t1190
network
elastic
in the wild, we have observed three different types of attempts that could potentially trigger false positives if the http status code is not in the query. please check this github gist for the specific uris : https://gist.github.com/patel-bhavin/d10830f3f375a2397233f6a4fe38d5c9 . these could be legitimate requests depending on the context of your organization. therefore, it is recommended to modify the analytic as needed to suit your specific environment.
t1190
network
splunk
internal vulnerability scanners
t1190
sigma
internal vulnerability scanners can cause some serious fps when used, if you experience a lot of fps due to this think of adding more filters such as \"user agent\" strings and more response codes
t1189
t1190
t1221
sigma
inventory and monitoring activity
t1190
t1505
t1505.001
sigma
iot (internet of things) devices and networks may use telnet and can be excluded if desired. some business work-flows may use telnet for administration of older devices. these often have a predictable behavior. telnet activity involving an unusual source or destination may be more suspicious. telnet activity involving a production server that has no known associated telnet work-flow or business requirement is often suspicious.
t1021
t1190
network
elastic
ipv4-to-ipv6 mapped ips
t1078
t1133
t1190
windows
sigma
it is highly possible you will find false positives, however, the base score is set to 2 for _any_ jndi found in raw logs. tune and change as needed, include any filtering.
t1133
t1190
web server
splunk
it is important to note that false positives may occur if the search criteria are expanded beyond the http status code 200. in other words, if the search includes other http status codes, the likelihood of encountering false positives increases. this is due to the fact that http status codes other than 200 may not necessarily indicate a successful exploitation attempt.
t1190
network
splunk
it's possible that legitimate traffic will have long urls or long user agent strings and that common sql commands may be found within the url. please investigate as appropriate.
t1190
database server
splunk
java scripts and css files
t1190
sigma
legitimate applications
t1190
t1505
t1505.001
sigma
legitimate apps
t1190
sigma
legitimate apps the use these paths
t1190
sigma
legitimate java applications may use perform outbound connections to these ports. filter as needed
t1133
t1190
endpoint
splunk
legitimate logon attempts over the internet
t1078
t1133
t1190
windows
sigma
legitimate new account creation by authorized administrators will generate similar log entries. however, those should include proper authentication details. verify any detected events against expected administrative activities and authorized user lists.
t1190
web application
splunk
legitimate processes may be spawned from the microsoft exchange server unified messaging (um) service. if known processes are causing false positives, they can be exempted from the rule.
t1190
t1210
windows
elastic
legitimate usage of the big ip rest api to execute command for administration purposes
t1190
sigma
legitimate use of acls to enable customer and staff access from the public internet into a public vpc
t1190
aws
sigma
legitimate use of scx runasprovider executescript.
t1068
t1190
t1203
linux
sigma
legitimate use of scx runasprovider invoke_executeshellcommand.
t1068
t1190
t1203
linux
sigma
legitimate winrm usage
t1190
windows
sigma
limited false positives, however, tune as needed.
t1133
t1190
endpoint
splunk
missing .vm files
t1190
velocity
sigma
network monitoring or management products may have a web server component that runs shell commands as part of normal behavior.
t1190
t1505
_deprecated
linux
elastic
new subnets added requiring routing setup
t1190
aws
sigma
new vpc creation requiring setup of a new route table
t1190
aws
sigma
new vpcs and subnets being setup requiring a different security profile to those already defined
t1190
aws
sigma
particular web applications may spawn a shell process legitimately
t1190
t1505
t1505.003
windows
sigma
powershell and windows command shell are often observed as legit child processes of the jetbrains teamcity service and may require further tuning.
t1059
t1190
windows
elastic
puppeteer invocation exceptions often contain child_process related errors, that doesn't necessarily mean that the app is vulnerable.
t1190
nodejs
sigma
rdp connections may be made directly to internet destinations in order to access windows cloud server instances but such connections are usually made only by engineers. in such cases, only rdp gateways, bastions or jump servers may be expected internet destinations and can be exempted from this rule. rdp may be required by some work-flows such as remote access and support for specialized software products and servers. such work-flows are usually known and not unexpected. usage that is unfamiliar to server or network owners can be unexpected and suspicious.
t1048
t1190
_deprecated
elastic
repurposing of an elb or alb to serve a different or additional application
t1190
aws
sigma
scanning attempts with the abnormal use of the http post method with no indication of code execution within the http client (request) body. an example would be vulnerability scanners trying to identify unpatched versions while not actually exploiting the vulnerability. see description for investigation tips.
t1021
t1021.006
t1068
t1190
t1203
t1210
zeek
sigma
security audits, maintenance, and network administrative scripts may trigger this alert when run under web processes.
t1047
t1059
t1190
t1505
windows
elastic
similar to cve-2023-35078, the path for exploitation indicates that status=200 is required for successful exploitation of the vulnerability. false positives may be present if status=200 is removed from the search. if it is removed,then the search also alert on status=301 and status=404 which indicates unsuccessful exploitation attempts. analysts may find it useful to hunt for these status codes as well, but it is likely to produce a significant number of alerts as this is a widespread vulnerability.
t1133
t1190
web server
splunk
some network security policies allow rdp directly from the internet but usage that is unfamiliar to server or network owners can be unexpected and suspicious. rdp services may be exposed directly to the internet in some networks such as cloud environments. in such cases, only rdp gateways, bastions or jump servers may be expected expose rdp directly to the internet and can be exempted from this rule. rdp may be required by some work-flows such as remote access and support for specialized software products and servers. such work-flows are usually known and not unexpected.
t1021
t1190
network
elastic
some network security policies allow ssh directly from the internet but usage that is unfamiliar to server or network owners can be unexpected and suspicious. ssh services may be exposed directly to the internet in some networks such as cloud environments. in such cases, only ssh gateways, bastions or jump servers may be expected expose ssh directly to the internet and can be exempted from this rule. ssh may be required by some work-flows such as remote access and support for specialized software products and servers. such work-flows are usually known and not unexpected.
t1021
t1190
_deprecated
elastic
the jsp file names are static names used in current proof of concept code. =
t1133
t1190
t1505
t1505.003
web server
splunk
the proof of concept exploit script indicates that status=200 is required for successful exploitation of the vulnerability. false positives may be present if status=200 is removed from the search. if it is removed,then the search also alert on status=301 and status=404 which indicates unsuccessful exploitation attempts. analysts may find it useful to hunt for these status codes as well, but it is likely to produce a significant number of alerts as this is a widespread vulnerability.
t1133
t1190
web server
splunk
the query is structured in a way that `action` (read, create) is not defined. review the results of this query, filter, and tune as necessary. it may be necessary to generate this query specific to your endpoint product.
t1133
t1190
t1505
t1505.003
t1566
t1566.001
endpoint
splunk
there are no known false positive for this search, but it could contain false positives as multiple detections can trigger and not have successful exploitation. modify the static value distinct_detection_name to a higher value. it is also required to tune analytics that are also tagged to ensure volume is never too much.
t1059
t1105
t1133
t1190
endpoint
splunk
this analytic is limited to http status 200; adjust as necessary. false positives may occur if the uri path is ip-restricted or externally blocked. it's recommended to review the context of the alerts and adjust the analytic parameters to better fit the specific environment.
t1190
vpn appliance
network
splunk
this rule was tuned using the following baseline: https://raw.githubusercontent.com/microsoft/css-exchange/main/security/baselines/baseline_15.2.792.5.csv from microsoft. depending on version, consult https://github.com/microsoft/css-exchange/tree/main/security/baselines to help determine normalcy.
t1190
t1210
windows
elastic
tune based on assets if possible, or restrict to known confluence servers. remove the ${ for a more broad query. to identify more exec, remove everything up to the last parameter (runtime().exec) for a broad query.
t1133
t1190
t1505
web server
splunk
unlikely
t1003
t1003.001
t1003.002
t1003.004
t1003.005
t1003.006
t1005
t1007
t1008
t1012
t1014
t1016
t1018
t1021
t1021.002
t1021.003
t1021.006
t1027
t1027.005
t1033
t1036
t1036.003
t1036.005
t1036.007
t1041
t1046
t1047
t1048
t1048.001
t1053
t1053.003
t1053.005
t1055
t1055.001
t1056
t1057
t1059
t1059.001
t1059.002
t1059.003
t1068
t1070
t1071
t1071.001
t1071.004
t1078
t1082
t1083
t1087
t1090
t1090.001
t1090.003
t1105
t1106
t1112
t1115
t1123
t1127
t1132
t1132.001
t1133
t1134
t1134.001
t1134.002
t1134.004
t1136
t1136.001
t1136.002
t1137
t1137.002
t1140
t1190
t1202
t1203
t1204
t1210
t1213
t1213.003
t1216
t1218
t1218.001
t1218.008
t1218.010
t1218.011
t1218.013
t1219
t1486
t1489
t1490
t1496
t1498
t1499
t1499.001
t1505
t1505.003
t1526
t1528
t1543
t1543.003
t1546
t1546.008
t1546.015
t1548
t1548.003
t1550
t1550.003
t1552
t1552.004
t1553
t1553.004
t1555
t1556
t1557
t1557.001
t1558
t1558.003
t1562
t1562.001
t1562.002
t1562.010
t1564
t1564.004
t1566
t1569
t1569.002
t1570
t1574
t1574.001
t1574.002
t1586
t1587
t1587.001
t1588
t1588.002
t1590
t1590.001
t1590.002
t1620
t1649
windows
opencanary
okta
m365
azure
bitbucket
macos
linux
sigma
user searches in search boxes of the respective website
t1189
t1190
t1221
t1505
t1505.003
sigma
vnc connections may be received directly to linux cloud server instances but such connections are usually made only by engineers. vnc is less common than ssh or rdp but may be required by some work-flows such as remote access and support for specialized software products or servers. such work-flows are usually known and not unexpected. usage that is unfamiliar to server or network owners can be unexpected and suspicious.
t1190
t1219
network
elastic
vulnerability scanners
t1078
t1078.004
t1110
t1190
t1505
t1505.001
azure
sigma