Skip to content

Commit

Permalink
Merge PR SigmaHQ#4527 from @sifex - Update README.md with a new descr…
Browse files Browse the repository at this point in the history
…iption image

chore: Update README.md

---------

Co-authored-by: Alex <[email protected]>
Co-authored-by: nasbench <[email protected]>
  • Loading branch information
3 people authored and swachchhanda committed Oct 30, 2023
1 parent fa85c19 commit b23f909
Show file tree
Hide file tree
Showing 5 changed files with 49 additions and 3 deletions.
9 changes: 6 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
<br />
<picture>
<source media="(prefers-color-scheme: dark)" srcset="./images/sigma_logo_dark.png">
<img height="135" alt="Sigma Logo" src="./images/sigma_logo_light.png">
<img width="454" alt="Sigma Logo" src="./images/sigma_logo_light.png">
</picture>
</p>
</a>
Expand Down Expand Up @@ -40,7 +40,10 @@ The main purpose of this project is to provide a structured form in which resear

Sigma is for log files what [Snort](https://www.snort.org/) is for network traffic and [YARA](https://github.com/VirusTotal/yara) is for files.

![sigma_description](./images/Sigma-description.png)
<picture>
<source media="(prefers-color-scheme: dark)" srcset="./images/Sigma_description_dark.png">
<img alt="Sigma Description - A diagram showing Yaml Files (Sigma Rules) moving through a Sigma Convertor, and coming out as many SIEM logos, showing how Sigma rules can be converted to many different available SIEM query languages" src="./images/Sigma_description_light.png">
</picture>

### Why Sigma

Expand Down Expand Up @@ -116,4 +119,4 @@ This project would've never reached this hight without the help of the hundreds

## Licenses

The content of this repository is released under the [Detection Rule License (DRL) 1.1](https://github.com/SigmaHQ/Detection-Rule-License)
The content of this repository is released under the [Detection Rule License (DRL) 1.1](https://github.com/SigmaHQ/Detection-Rule-License).
Binary file removed images/Sigma-description.png
Binary file not shown.
Binary file added images/Sigma_description_dark.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/Sigma_description_light.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
43 changes: 43 additions & 0 deletions rules/windows/process_creation/proc_creation_win_hktl_winpwn.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
title: HackTool - WinPwn Execution
id: d557dc06-62e8-4468-a8e8-7984124908ce
status: experimental
description: Detects command line parameters used by WinPwn, a tool for Windows and Active Directory reconnaissance and exploitation.
author: Swachchhanda Shrawan Poudel
date: 2023/10/30
references:
- https://github.com/S3cur3Th1sSh1t/WinPwn
- https://www.publicnow.com/view/EB87DB49C654D9B63995FAD4C9DE3D3CC4F6C3ED?1671634841
- https://reconshell.com/winpwn-tool-for-internal-windows-pentesting-and-ad-security/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1082/T1082.md
- https://grep.app/search?q=winpwn&filter[repo][0]=redcanaryco/atomic-red-team
tags:
- attack.discovery
- attack.t1046
- attack.t1082
- attack.t1518
- attack.credential_access
- attack.t1552.001
- attack.t1555
- attack.t1555.003
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1548.002
- attack.execution
- attack.t1106
logsource:
category: process_creation
product: windows
detection:
selection_powershell_commandlets:
CommandLine|contains:
- '\WinPwn.ps1'
- '\Offline_Winpwn.ps1'
selection_flags:
CommandLine|contains:
- '-noninteractive'
- '-consoleoutput'
- '-command'
condition: all of selection_*
falsepositives:
- Unknown
level: high

0 comments on commit b23f909

Please sign in to comment.