heroui logo

JNDIExploit Pattern

Sigma Rules

View Source
Summary
The rule ‘JNDIExploit Pattern’ is designed to detect attempts at exploiting vulnerabilities associated with the JNDI-Exploit-Kit. This kit is often utilized in attacks targeting web servers via the Java Naming and Directory Interface (JNDI) to execute arbitrary code through various methods of deserialization and remote code execution. The detection leverages a set of specific keywords indicative of exploit patterns used in these types of attacks. Keywords reflect multiple exploit techniques, including Base64 commands, reverse shells, and various exploits targeting Java application servers such as Tomcat, Weblogic, and JBoss. This rule is crucial for monitoring and protecting Java applications against sophisticated initial access strategies employed by attackers.
Categories
  • Web
  • Cloud
  • Infrastructure
Data Sources
  • Web Credential
  • Network Traffic
  • Application Log
Created: 2021-12-12