heroui logo

Windows System Network Config Discovery Display DNS

Splunk Security Content

View Source
Summary
This detection rule focuses on monitoring the execution of the "ipconfig /displaydns" command within a Windows environment. This command, utilized for retrieving DNS configuration and cached DNS information, is frequently exploited by threat actors and post-exploitation frameworks such as WINPEAS to gather critical information about network configurations. By leveraging Endpoint Detection and Response (EDR) data, specifically monitoring command-line executions related to this tool, security teams can identify potentially malicious activities. If detected, such activities indicate an attempt to map the network, gather DNS server details, and could signal preparations for further attacks or lateral movement within a compromised network. Therefore, continuous monitoring of these commands is essential to prevent data exfiltration and unauthorized network access.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1016
Created: 2024-11-13