
Summary
The rule titled 'Finger Execution' is designed to detect the execution of the 'finger.exe' command on Windows systems, which can be exploited by attackers to extract user information from remote machines through the Finger protocol. This executable is often categorized under Living Off the Land Binaries and Scripts (LOLBAS), representing a common attack vector where legitimate system tools are used in malicious activities. The detection logic leverages Sysmon and event code filtering to identify instances where 'finger.exe' is invoked or potentially abused, analyzing process names for signs indicative of attempted data exfiltration or unauthorized user queries. This rule assists in identifying lateral movement and reconnaissance behavior within an organization, contributing to overall endpoint security posture enhancement.
Categories
- Windows
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1105
Created: 2024-02-09