CVE-2023-21554原始查询利用略有不同的字段

admin 2023年4月17日01:38:32评论47 views字数 1202阅读4分0秒阅读模式





点击蓝字,关注我们





识别具有服务和侦听端口的主机:

MDE

DeviceNetworkEvents| where Timestamp > ago(30d)| where ActionType == "ListeningConnectionCreated"| where LocalPort == "1801"| where InitiatingProcessVersionInfoOriginalFileName has "MQSVC"| summarize by DeviceName

Sentinel

DeviceNetworkEvents| where TimeGenerated > ago(30d)| where ActionType == "ListeningConnectionCreated"| where LocalPort == "1801"| where InitiatingProcessVersionInfoOriginalFileName has "MQSVC"| summarize by DeviceName

Look for possible exploitation of CVE-2023-21554

//possible exploitation of CVE-2023-21554//if successful look for a a follow-up outbound connection to the same external IP or to a possible secondary C2 connection. This would likely result in a child process being spawned from mqsvc.exe that should also be investigated. On the external facing infra this will likely materialise in a webshell or similar.DeviceNetworkEvents| where InitiatingProcessFileName =~ "mqsvc.exe" and LocalPort == 1801 and ActionType == 'InboundConnectionAccepted'

Look for child processes spawned by mqsvc.exe

DeviceProcessEvents| where ( InitiatingProcessFileName has "mqsvc.exe" and isnotempty(FileName) ) or (InitiatingProcessParentFileName has "mqsvc.exe" and isnotempty(InitiatingProcessFileName) )


可以使用Chat GPT进行解析以上内容更快速了解相关利用!



点击此处“阅读全文”查看更多内容
CVE-2023-21554原始查询利用略有不同的字段

原文始发于微信公众号(Ots安全):CVE-2023-21554原始查询利用略有不同的字段

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年4月17日01:38:32
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2023-21554原始查询利用略有不同的字段https://cn-sec.com/archives/1671358.html

发表评论

匿名网友 填写信息