In this post we will show you how to detect Sharphound both at the client side as well as at the DC side:
Client Side artifacts:
- Multiple connections to LDAP/LDAPS (389/636) and SMB (445) tcp ports
- Multiple connection to named pipes "srvsvc" and "lsass"
- Connections to named pipes srvsvc, lsarpc and samr (apply to "default" and "all" scan modes)
- Connections to named pipe srvsvc and access to share relative target name containing "Groups.xml" and "GpTmpl.inf" (apply to --Stealth scan mode)
Below examples of events we've observed while testing Sharphound with the "all", "--Stealth" and "default" scan modes:
Detection Examples:
- CarbonBlack: (ipport:389 or ipport:636) and ipport:445 and filemod:srvsvc and filemod:lsass
- You can use Sysmon EID 18 (Pipe Connect) & EID 3 Network Connect to build the same logic as for the above rule
- EventID-5145 and RelativeTargetName={srvcsvc or lsarpc or samr} and at least 3 occurences with different RelativeTargetName and Same (Source IP, Port) and SourceUserName not like "*DC*$" within 1 minute
References:
No comments:
Post a Comment