
Summary
This detection rule, authored by Teoderick Contreras from Splunk, aims to identify the execution of the PowerView PowerShell command `Get-NetUser` with the `-PreauthNotRequire` parameter. It specifically targets Event ID 4104 from PowerShell Script Block Logging, which records the script blocks executed in PowerShell. The primary intent of the PowerShell cmdlet is to query user accounts in Active Directory that do not mandate Kerberos preauthentication, a flag that can indicate potential vulnerabilities in user accounts. Attackers often exploit this information during reconnaissance phases to gather details about accounts susceptible to unauthorized access or privilege escalation attempts. Thus, monitoring for this specific activity is crucial for detecting potential malicious reconnaissance efforts.
Categories
- Endpoint
- Windows
- Identity Management
Data Sources
- Persona
- Pod
- Script
- Process
ATT&CK Techniques
- T1087
Created: 2024-11-13