Detecting Overpass-the-Hash
Attack Steps
Overpass-the-Hash Detection Opportunities
Key Detection Logic
Example Splunk Query: Detecting Overpass-the-Hash Targeting Rubeus
index=main earliest=1690443407 latest=1690443544 source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational" (EventCode=3 dest_port=88 Image!=*lsass.exe) OR EventCode=1
| eventstats values(process) as process by process_id
| where EventCode=3
| stats count by _time, Computer, dest_ip, dest_port, Image, process
| fields - countExplanation of Key Components
Additional Recommendations
Last updated