mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-01-29 14:52:21 +01:00
Updated yml/OtherMSBinaries/Sqlps.yml, used recently in a campaign shared my Microsoft Security Intelligence. Would be useful reference for Red Teamers/Offensive Security Engineers as well as Blue Teamers/Defenders who reference this open source project/library.
This commit is contained in:
parent
3ce3ec6656
commit
68b772a567
@ -16,6 +16,7 @@ Full_Path:
|
||||
- Path: C:\Program files (x86)\Microsoft SQL Server\110\Tools\Binn\sqlps.exe
|
||||
- Path: C:\Program files (x86)\Microsoft SQL Server\120\Tools\Binn\sqlps.exe
|
||||
- Path: C:\Program files (x86)\Microsoft SQL Server\130\Tools\Binn\sqlps.exe
|
||||
- Path: C:\Program Files (x86)\Microsoft SQL Server\150\Tools\Binn\SQLPS.exe
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
@ -24,9 +25,12 @@ Detection:
|
||||
- Elastic: https://github.com/elastic/detection-rules/blob/5bdf70e72c6cd4547624c521108189af994af449/rules/windows/execution_suspicious_powershell_imgload.toml
|
||||
- Splunk: https://github.com/splunk/security_content/blob/aa9f7e0d13a61626c69367290ed1b7b71d1281fd/docs/_posts/2021-10-05-suspicious_copy_on_system32.md
|
||||
Resources:
|
||||
- Link: https://twitter.com/ManuelBerrueta/status/1527289261350760455
|
||||
- Link: https://twitter.com/bryon_/status/975835709587075072
|
||||
- Link: https://docs.microsoft.com/en-us/sql/powershell/sql-server-powershell?view=sql-server-2017
|
||||
Acknowledgement:
|
||||
- Person: Bryon
|
||||
Handle: '@bryon_'
|
||||
- Person: Manny
|
||||
Handle: '@ManuelBerrueta'
|
||||
---
|
||||
|
Loading…
Reference in New Issue
Block a user