heroui logo

Detect Certify With PowerShell Script Block Logging

Splunk Security Content

View Source
Summary
This detection rule identifies the usage of the Certify tool through PowerShell Script Block Logging, specifically monitoring event code 4104. It targets specific command patterns indicative of enumeration activities against Active Directory Certificate Services (AD CS). Such activities are significant as they may point to reconnaissance or exploitation attempts, which can lead to unauthorized certificate issuance. Attackers can potentially use this access to escalate privileges, maintain persistence, or extract confidential information from the environment. The rule captures a range of command patterns associated with Certify's functionalities to effectively flag these potentially malicious activities.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Pod
  • Script
ATT&CK Techniques
  • T1649
  • T1059
  • T1059.001
Created: 2024-11-13