Skip to main content

Hacking Tools - SharpH0und, Cred Dumping, etc.

  • March 18, 2024
  • 5 replies
  • 42 views

Forum|alt.badge.img+3

Hello Experts, Can someone please provide some sample rules to detect SharpH0und, Cred Dumping?

Is this one of the detection premises for this detection rule? 

Look for processes with names matching SharpHound (e.g., "SharpHound.exe", "SharpHound.x64.exe") or other credential dumping tools (e.g., "Mimikatz", "LaZagne"). *Suspicious Interpreters: Monitor processes launched with interpreters commonly used for hacking tools (e.g., PowerShell (.exe), cmd.exe, cscript.exe). Analyze the command-line arguments passed to these processes to identify potential hacking tool usage.

5 replies

tameri
Staff
Forum|alt.badge.img+5
  • Staff
  • March 19, 2024

Forum|alt.badge.img+3
  • Author
  • Bronze 3
  • March 20, 2024

Forum|alt.badge.img+3
  • Author
  • Bronze 3
  • March 20, 2024

tameri
Staff
Forum|alt.badge.img+5
  • Staff
  • March 20, 2024

@ravivittal , sure you can use the same for Sharphound or any other tools

These URLs are sample to guide and inspire you when write rules specific for your use cases.

Regards

 

 


Forum|alt.badge.img
  • New Member
  • September 27, 2024

I’ve also been diving into some of these hacking tools, like SharpH0und and the whole cred dumping scene. How much power you can get with the right tools is pretty wild. SharpH0und is a real gem for mapping Active Directory environments; it’s almost like having a treasure map to all the juicy data points!