Skip to content

[New Rule] ADExplorer collecting Active Directory information #4697

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
pl853 opened this issue May 5, 2025 · 0 comments
Open

[New Rule] ADExplorer collecting Active Directory information #4697

pl853 opened this issue May 5, 2025 · 0 comments
Assignees

Comments

@pl853
Copy link

pl853 commented May 5, 2025

Description

This rule will be used to detect hackers using ADExplorer to create AD snapshots, which can then be imported in bloodhound using: https://github.com/c3c/ADExplorerSnapshot.py

Some info regarding the way to detect this using LDAP query telemetry, can be found on the following page:
https://medium.com/falconforce/falconfriday-detecting-active-directory-data-collection-0xff21-c22d1a57494c

Target Ruleset

None

Target Rule Type

None

Tested ECS Version

No response

Query

No response

New fields required in ECS/data sources for this rule?

No response

Related issues or PRs

No response

References

https://medium.com/falconforce/falconfriday-detecting-active-directory-data-collection-0xff21-c22d1a57494c
https://github.com/c3c/ADExplorerSnapshot.py

Redacted Example Data

No response

@pl853 pl853 added Rule: New Proposal for new rule Team: TRADE labels May 5, 2025
@w0rk3r w0rk3r self-assigned this May 5, 2025
@w0rk3r w0rk3r added the backlog label May 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants