heroui logo

NetNTLM Downgrade Attack - Registry

Sigma Rules

View Source
Summary
This detection rule identifies potential NetNTLM downgrade attacks targeting Windows systems. These attacks focus on exploiting weak security configurations within the registry that can downgrade the authentication methods used by NTLM to less secure versions, making it easier for attackers to intercept and utilize credentials. Specifically, this rule monitors changes made to critical registry keys linked to NTLM authentication settings, including the `lmcompatibilitylevel`, `NtlmMinClientSec`, and `RestrictSendingNTLMTraffic`. By searching for settings that allow the use of insecure protocols or configurations, such as setting values to 0 or 1 for these keys, the detection aims to alert security teams of possible malicious intent or misconfigurations that could lead to unauthorized access. The rule is crucial for maintaining secure authentication practices on Windows endpoints, especially in environments where legacy systems might still be in use.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2018-03-20