
Summary
The rule identifies potential path traversal attempts via command-line execution on Windows systems utilizing data from Endpoint Detection and Response (EDR) agents. It is essential because path traversal techniques, such as those employing multiple instances of '/..', '\..', or '\\..', are typically used by attackers to bypass security controls and execute malicious payloads. If successful, such activities can lead to significant security incidents, including arbitrary code execution, data theft, and further lateral attacks within the network. The detection mechanism is achieved by analyzing Sysmon and Windows Event logs, particularly focusing on command-line arguments to highlight suspicious patterns indicative of path traversal. Specific counts of these instances are calculated using Splunk's analytics capabilities, allowing security teams to respond to verified threats rapidly. Implementing this rule necessitates careful mapping of logs to the Splunk Common Information Model (CIM) to optimize detection efficacy and minimize false positives.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Logon Session
- Process
ATT&CK Techniques
- T1059
Created: 2024-11-13