heroui logo

GetDomainController with PowerShell Script Block

Splunk Security Content

View Source
Summary
This analytic rule detects the execution of the `Get-DomainController` PowerShell commandlet by leveraging PowerShell Script Block Logging (EventCode=4104). The commandlet is a feature of PowerView, a reconnaissance tool that is commonly used for domain enumeration. The detection is crucial as its activation may indicate that an adversary or red team is probing the environment to map out domain controllers. Such activity, if malicious, can lead to further domain enumeration which poses a significant risk by potentially exposing sensitive information and facilitating lateral movement within the network. Implementing this detection mechanism involves enabling PowerShell Script Block Logging on relevant endpoints. Administrators should be aware that legitimate usage by authorized users for troubleshooting could generate false positives, thus requiring careful analysis of the context in which this command is invoked.
Categories
  • Endpoint
Data Sources
  • Pod
ATT&CK Techniques
  • T1018
  • T1059.001
Created: 2024-11-13