Recon Command Output Piped To Findstr.EXE

Rule Info

Name
Recon Command Output Piped To Findstr.EXE
Author
Nasreddine Bencherchali (Nextron Systems), frack113
Description
Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example. Attackers often time use this technique to extract specific information they require in their reconnaissance phase.
Date
2023-07-06 00:00:00
Modified
2024-06-27 00:00:00
Id
ccb5742c-c248-4982-8c5c-5571b9275ad3
Tags
attack.discovery attack.t1057
Type
Community Rule

Rule History

Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
Nasreddine Bencherchali
Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
2024-07-17
phantinuss
Merge PR #4564 from @nasbench - Fix Further FPs Found In Testing
2023-11-15
phantinuss
Revert "Merge PR #4564 from @nasbench - Fix Further FPs Found In Testing"
2023-11-15
phantinuss
Merge PR #4564 from @nasbench - Fix Further FPs Found In Testing
2023-11-15
phantinuss
Revert "Fix Further FPs Found In Testing (#4564)"
2023-11-15
Nasreddine Bencherchali
Fix Further FPs Found In Testing (#4564)
2023-11-15
frack113
Merge PR #4496 from @frack113 - Update & Add Findstr.EXE Rules
2023-10-28