Detecting Netsh attacks
It is a common practice for attackers of all types to leverage native Windows tools and functionality to execute commands for malicious reasons, and Netsh.exe
is one of these tools with abuse potential. It can be used locally or remotely as a command-line scripting utility to display or modify the network configuration of a computer that is currently running.
You are an analyst responsible for your organization's overall security posture. You need to be able to detect activities associated with the abuse of Netsh, through which netsh.exe
can disable local firewall settings or set up a remote connection to a host from an infected system.
Required data
- Microsoft: Windows process launch logs and Sysmon
How to use Splunk software for this use case
Next steps
You might also find this use case helpful in your threat hunting efforts: