
Rule Info
Name
Recon Command Output Piped To Findstr.EXE
Author
Nasreddine Bencherchali (Nextron Systems), frack113
Description
Detects the execution of a potential recon command where the results are piped to "findstr". This is meant to trigger on inline calls of "cmd.exe" via the "/c" or "/k" for example.
Attackers often time use this technique to extract specific information they require in their reconnaissance phase.
Date
2023-07-06 00:00:00
Modified
2024-06-27 00:00:00
Id
ccb5742c-c248-4982-8c5c-5571b9275ad3
Tags
attack.discovery attack.t1057
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
Nasreddine Bencherchali
Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
2024-07-17
phantinuss
Revert "Merge PR #4564 from @nasbench - Fix Further FPs Found In Testing"
2023-11-15