Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create Potential_MSRPRN_Printer_Bug_Exploitation.yaml #3806

Closed
wants to merge 1 commit into from

Conversation

vpaschalidis
Copy link
Contributor

This query detects potential attempts to remotely access to the print spooler service on Active Directory Domain Controllers which could indicate an exploitation of MS-RPRN printer bug from a server that is configured with unconstrained delegation.
This query searches for the event id 5145 on Domain Controllers where the ShareName is "\*\IPC$", the RelativeTargetName is "spoolss" and the source IP address belongs to an unconstrained delegation server.
Ref: https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5145

Before submitting this PR please ensure that you have read the following sections and then completed the template below:

Thank you for your contribution to the Microsoft Sentinel Github repo.

The code should have been tested in a Microsoft Sentinel environment that does not have any custom parsers, functions or tables, so that you validate no incorrect syntax and execution functions properly.

Details of the code changes in your submitted PR. Providing descriptions for pull requests ensures, there is context to changes being made and greatly enhances the code review process. Providing associated Issues that this resolves also easily connects the reason.

Change(s):

  • Updated syntax for Potential_MSRPRN_Printer_Bug_Exploitation.yaml

Reason for Change(s):

After the submission has been made, please look at the Validation Checks:

Check that the validations are passing and address any issues that are present. Let us know if you have tried fixing and need help.

References:

PR Template


Description for the PR:
(Enter the description below)
This query detects potential attempts to remotely access to the print spooler service on Active Directory Domain Controllers which could indicate an exploitation of MS-RPRN printer bug from a server that is configured with unconstrained delegation.
This query searches for the event id 5145 on Domain Controllers where the ShareName is "\*\IPC$" and the RelativeTargetName is "spoolss".

Testing Completed:
Yes/ No : Yes


This query detects potential attempts to remotely access to the print spooler service on Active Directory Domain Controllers which could indicate an exploitation of MS-RPRN printer bug from a server that is configured with unconstrained delegation.
This query searches for the event id 5145 on Domain Controllers where the ShareName is "\\\*\IPC$", the RelativeTargetName is "spoolss" and the source IP address belongs to an unconstrained delegation server.
Ref: https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5145
@ghost
Copy link

ghost commented Dec 29, 2021

CLA assistant check
All CLA requirements met.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant