finish (#136)
This commit is contained in:
@@ -1,6 +1,5 @@
|
||||
title: BitsJob
|
||||
description: Adversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads.
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: PowerShell Execution Pipeline
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: PowerShell Execution Remote Command
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: The Audit log file was cleared
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: Sensitive Privilede Use (Mimikatz)
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: An Operation was attempted on a privileged object
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: Command Line Logging
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: A user account was created.
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: A member was added to a security-enabled global group.
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: A member was added to a security-enabled local group.
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: A member was added to a security-enabled universal group.
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
title: An account failed to log on
|
||||
description: hogehoge
|
||||
enabled: false
|
||||
ignore: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
title: An account failed to log on
|
||||
description: hogehoge
|
||||
enabled: false
|
||||
ignore: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
title: Command Line Logging
|
||||
description: hogehoge
|
||||
enabled: false
|
||||
ignore: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: Sysmon Check command lines
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: Check for unsigned EXEs/DLLs
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: The System log file was cleared
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: This service may not function properly
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: The ... service entered the stopped|running state
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: The start type of the Windows Event Log service was changed from auto start to disabled
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: A service was installed in the system
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: AS-REP Roasting
|
||||
description: For each account found without preauthentication, an adversary may send an AS-REQ message without the encrypted timestamp and receive an AS-REP message with TGT data which may be encrypted with an insecure algorithm such as RC4.
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: Kerberoasting
|
||||
description: Adversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to obtain a ticket-granting service (TGS) ticket that may be vulnerable to Brute Force.
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
title: PowerShell DownGradeAttack
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -43,9 +43,10 @@ impl ParseYaml {
|
||||
Ok(docs) => {
|
||||
for i in docs {
|
||||
// If there is no "enabled" it does not load
|
||||
if i["enabled"].as_bool().unwrap_or(false) {
|
||||
&self.files.push(i);
|
||||
if i["ignore"].as_bool().unwrap_or(false) {
|
||||
continue;
|
||||
}
|
||||
&self.files.push(i);
|
||||
}
|
||||
}
|
||||
Err(e) => {
|
||||
|
||||
Reference in New Issue
Block a user