heroui logo

Start-NetEventSession - PowerShell

Anvilogic Forge

View Source
Summary
The PowerShell cmdlet Start-NetEventSession is utilized by attackers to initiate event and packet capture for network sessions, allowing them to gather sensitive information such as user credentials transmitted over unencrypted protocols. This rule aims to detect the usage of the Start-NetEventSession cmdlet through the execution of PowerShell scripts or commands. Effective detection hinges on PowerShell logging, as the commands must generate new processes, typically executed in a format like 'powershell -command'. The detection logic queries EDR logs in real-time, specifically looking for processes that include the Start-NetEventSession command within a recent timeframe; thus, it can quickly identify any attempts to leverage this potentially malicious technique. It is crucial for organizations to implement robust logging practices to ensure comprehensive visibility into these activities, thereby fortifying their defenses against credential theft via network sniffing.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
ATT&CK Techniques
  • T1040
Created: 2024-06-13