
Summary
The rule named "SharpHound Recon Sessions" detects remote procedure calls (RPC) initiated by the SharpHound tool for the purpose of mapping remote connections and local group memberships within a network. SharpHound, associated with the BloodHound project, is commonly utilized for reconnaissance during penetration tests to enumerate Active Directory environments. This detection rule is crucial, as it identifies specific RPC calls known to be exploited by SharpHound, providing a proactive measure to monitor and prevent unauthorized reconnaissance activities. The rule relies on event logs generated by the RPC Firewall, specifically looking for a certain event ID (3) that corresponds to the use of a well-defined Interface UUID intended for network enumeration tasks. By implementing this detection rule and monitoring the specified event conditions, security teams can better manage and mitigate the risks associated with lateral movement and unauthorized network discovery activities.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Application Log
- Network Traffic
Created: 2022-01-01