33 lines
756 B
YAML
33 lines
756 B
YAML
|
|
title: AzureHound PowerShell Commands
|
|
author: Austin Songer (@austinsonger)
|
|
date: 2021/10/23
|
|
description:
|
|
detection:
|
|
SELECTION_1:
|
|
ScriptBlockText:
|
|
- '*Invoke-AzureHound*'
|
|
condition: SELECTION_1
|
|
falsepositives:
|
|
- Penetration testing
|
|
id: 83083ac6-1816-4e76-97d7-59af9a9ae46e
|
|
level: high
|
|
logsource:
|
|
category: ps_script
|
|
definition: Script Block Logging must be enable
|
|
product: windows
|
|
references:
|
|
- https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/AzureHound.ps1
|
|
- https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html
|
|
status: experimental
|
|
tags:
|
|
- attack.discovery
|
|
- attack.t1482
|
|
- attack.t1087
|
|
- attack.t1087.001
|
|
- attack.t1087.002
|
|
- attack.t1069.001
|
|
- attack.t1069.002
|
|
- attack.t1069
|
|
ruletype: SIGMA
|