
Summary
The detection rule named 'Crowdstrike Reverse Shell Tool Executed' is designed to monitor the execution of potentially malicious reverse shell tools, particularly focusing on the use of netcat on Windows systems. This rule checks for specific command-line patterns associated with netcat, a tool often exploited in cyber attacks to establish unauthorized connections back to an attacker’s machine. When a process that uses netcat is initiated with certain parameters indicative of reverse shell behavior, the system triggers an alert. Importantly, the rule carefully distinguishes between legitimate and malicious uses of netcat by analyzing the command-line arguments passed to the process. Any detection matching these criteria results in a high-severity alert to facilitate immediate investigation and response. The rule assists security teams in identifying and remediating potential compromises on Windows endpoints, thereby enhancing the overall security posture.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Network Traffic
ATT&CK Techniques
- T1059
Created: 2023-05-04