mirror of https://gitlab.com/curben/blog
feat(threat-hunting): UAC Change
This commit is contained in:
parent
55bdad209d
commit
8368e3879b
|
|
@ -2,7 +2,7 @@
|
|||
title: Splunk Threat Hunting
|
||||
layout: page
|
||||
date: 2025-01-15
|
||||
updated: 2025-10-05
|
||||
updated: 2025-11-30
|
||||
---
|
||||
|
||||
- [Generate ad_users.csv](ldap-ad-users)
|
||||
|
|
@ -112,6 +112,7 @@ updated: 2025-10-05
|
|||
- [Suspicious Netscaler CLI](suspicious-netscaler-cli)
|
||||
- [Suspicious Network Settings](suspicious-network-settings)
|
||||
- [Suspicious WMI](suspicious-wmi)
|
||||
- [UAC Change](uac-change)
|
||||
- [User Account Control (UAC) policy change](uac-policy-change)
|
||||
- [UPnP enablement](upnp-enablement)
|
||||
- [Unauthorised Reverse Proxy Tunnel](unauthorised-reverse-proxy-tunnel)
|
||||
|
|
|
|||
|
|
@ -0,0 +1,12 @@
|
|||
---
|
||||
title: UAC Change
|
||||
layout: page
|
||||
date: 2025-11-30
|
||||
---
|
||||
|
||||
References: [1](https://www.elastic.co/security-labs/roningloader#batch-scripts-to-bypass-uac-and-av-networking)
|
||||
SPL:
|
||||
|
||||
```spl
|
||||
index="windows" source IN ("XmlWinEventLog:Microsoft-Windows-PowerShell/Operational", "XmlWinEventLog:PowerShellCore/Operational") EventCode=4104 ScriptBlockText="*EnableLUA*"
|
||||
```
|
||||
Loading…
Reference in New Issue