Rule Library
Sigma Rules
3 rules found for "Georg Lauenstein (sure[secure])"
3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest
Linux HackTool Execution
Detects known hacktool execution based on image name.
LinuxProcess Creation
TA0002 · ExecutionTA0042 · Resource DevelopmentT1587 · Develop Capabilities
Nasreddine Bencherchali (Nextron Systems)+1Tue Jan 03linux
Detectionlowtest
Linux Network Service Scanning Tools Execution
Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.
LinuxProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+2Wed Oct 21linux
Detectionhightest
HackTool - winPEAS Execution
WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on book.hacktricks.xyz
WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryT1082 · System Information DiscoveryT1087 · Account Discovery+1
Georg Lauenstein (sure[secure])Mon Sep 19windows