Files
hayabusa/rules/powershell/downgrade_attack.yml
James 4a1e46e47e Feature/#140 document (#144)
* update

* fix regexes and whitelist

* underconstructing

* fix

* update

* add pic

* update

* update

* update

* fix
2021-10-22 00:43:40 +09:00

14 lines
349 B
YAML

title: PowerShell DownGradeAttack
description: hogehoge
author: Yea
detection:
selection:
Channel: Windows PowerShell
EventID: 400
EventData|re: '[\s\S]*EngineVersion=2\.0[\s\S]*'
falsepositives:
- unknown
output: 'Powershell DownGrade Attack Detected!!'
creation_date: 2020/11/8
updated_date: 2020/11/8