
Summary
This detection rule identifies potential path traversal attacks executed through the `conhost.exe` process on Windows systems. Path traversal vulnerabilities can allow attackers to manipulate command line inputs to execute arbitrary commands, leading to potential system or data compromise. The rule captures instances where `conhost.exe`, which is responsible for hosting console applications, is invoked with command line arguments containing the pattern '/../../'. Such patterns suggest an attempt to traverse directory structures, which is indicative of command or argument confusion that can be exploited for malicious purposes. This behavior could point to various attack vectors, including indirect command execution, where attackers use legitimate processes to manipulate the file system or execute commands outside their intended scope. Security monitoring tools should alert administrators whenever this rule is triggered, allowing for further investigation of the activity associated with the identified process. The ruling out of false positives, as marked in the detection, indicates that detection is set relatively high, presuming low occurrence of legitimate use cases.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2022-06-14