S0521 BloodHound Commandlets
S0521 - Bloodhound/Sharphound Execution Commandlets¶
DESCRIPTION¶
Detects BloodHound activity in commandlines. Bloodhound is and Active Directory (AD) reconnaissance tool that can reveal hidden relationships and identify attack paths within an AD environment
Example:
N/A
Related
Bloodhound/Sharphound
Reference:
https://github.com/SigmaHQ/sigma/blob/cf29e28a54daa9d52f7d1a5996f023e2d08cde84/rules/windows/process_creation/proc_creation_win_hktl_bloodhound_sharphound.yml#L40
ATT&CK TACTICS¶
Data Source(s): Command
SENTINEL RULE QUERY¶
Triage¶
- Inspect if the activity is expected and performed by an admin or a pen-test
- Check if other programs that use these command line option and accepts an 'All' parameter
VERSION¶
Version 1.0 (date: 10/07/2023)