
Summary
The 'PwnDrp Access' detection rule is designed to identify and alert on download attempts from PwnDrp web servers. PwnDrp is a service that is often leveraged for red team testing, and its traffic can also be indicative of criminal activities such as data exfiltration or unauthorized access efforts. The rule captures requests that show signs of access to specific URIs containing '/pwndrop/'. By analyzing proxy logs, this rule effectively flags clients that interact with these potentially malicious endpoints, specifically looking for requests that meet the specified criteria. Given its critical severity level, this detection is essential for systems needing to closely monitor their network traffic against known command-and-control behavior and tactics associated with the use of PwnDrp. The rule’s author, Florian Roth from Nextron Systems, developed it to enhance threat detection capabilities regarding C2 communications. This rule requires data from the proxy logs to function, potentially yielding a false positive result for unknown or benign queries to the identified endpoint.
Categories
- Network
- Web
- Cloud
Data Sources
- Web Credential
- Network Traffic
- Application Log
Created: 2020-04-15