heroui logo

Windows Password Policy Discovery with Net

Splunk Security Content

View Source
Summary
The rule identifies instances where the `net.exe` command is executed with arguments related to retrieving the computer or domain's password policy. Such behavior may suggest reconnaissance attempts by adversaries seeking to understand Active Directory password policies, which could assist in more effective brute-force or password-guessing attacks. The rule utilizes data from EDR agents, specifically leveraging various Sysmon and Windows Event Logs to monitor process executions. If an attack is confirmed, the gathered information on password complexity could be exploited to compromise user accounts and gain unauthorized access to the network. The detection works by filtering out common non-malicious uses of related commands, focusing only on those that could signal potential indicators of compromise.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • File
ATT&CK Techniques
  • T1201
Created: 2025-01-13