heroui logo

MSSQL XPCmdshell Suspicious Execution

Sigma Rules

View Source
Summary
This detection rule targets the MSSQL database system and aims to identify potential abuse of the `xp_cmdshell` stored procedure, which allows execution of command line commands directly from SQL Server. The rule is activated upon detecting a specific event (EventID 33205) that signals the use of `xp_cmdshell` to run commands, which may be indicative of an attacker attempting to manipulate or exploit the database server. The rule relies on SQL Server audit policies being correctly configured to ensure that such events are logged. This feature can be exploited by malicious users to execute arbitrary commands, posing significant security risks. It's essential for security teams to monitor the use of `xp_cmdshell` as it is often leveraged in post-exploitation scenarios to maintain persistence or escalate privileges within a network infrastructure.
Categories
  • Database
  • Windows
Data Sources
  • Application Log
Created: 2022-07-12