
Summary
The WebDav Put Request detection rule is designed to identify potentially malicious file uploads to a WebDav network share using the PUT HTTP method. This technique is often associated with data exfiltration attempts, as it allows an attacker to transfer files to web servers by manipulating the WebDav protocol. The rule specifically targets HTTP requests that utilize a user-agent containing 'WebDAV' and are executed via the PUT method. Further refinement is achieved with a filtering condition that excludes requests originating from private IP ranges to reduce potential false positives. The rule's detection is based on traffic analyzed by the Zeek (formerly Bro) intrusion detection system, which efficiently monitors network activity. Given its focus on exfiltration techniques, this rule is relevant for organizations looking to bolster their defenses against data breaches, especially those utilizing WebDav services. The low severity level indicates that while the detected behavior is noteworthy, it should be contextualized with additional threat intelligence and organizational security posture before taking action. Understanding the legitimate use cases of WebDAV within the organizational context is vital to minimize disruptions from false alarms.
Categories
- Web
- Network
Data Sources
- Web Credential
- Network Traffic
Created: 2020-05-02