From 9cb124f841c4358ca859e8474d6e7bb5268284a2 Mon Sep 17 00:00:00 2001 From: securepeacock <92804416+securepeacock@users.noreply.github.com> Date: Fri, 1 Sep 2023 17:14:04 -0400 Subject: [PATCH] Merge PR #4418 from @securepeacock - Fix typo in title - fix: New Port Forwarding Rule Added Via Netsh.EXE - Fix typo in title --------- Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com> --- .../proc_creation_win_netsh_port_forwarding.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/rules/windows/process_creation/proc_creation_win_netsh_port_forwarding.yml b/rules/windows/process_creation/proc_creation_win_netsh_port_forwarding.yml index e9ec2708c08..66a6adee20e 100644 --- a/rules/windows/process_creation/proc_creation_win_netsh_port_forwarding.yml +++ b/rules/windows/process_creation/proc_creation_win_netsh_port_forwarding.yml @@ -1,4 +1,4 @@ -title: New Port Forwarding Rule Added Via Netsh.EXX +title: New Port Forwarding Rule Added Via Netsh.EXE id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614 status: test description: Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule @@ -8,7 +8,7 @@ references: - https://www.dfirnotes.net/portproxy_detection/ author: Florian Roth (Nextron Systems), omkar72, oscd.community, Swachchhanda Shrawan Poudel date: 2019/01/29 -modified: 2023/04/20 +modified: 2023/09/01 tags: - attack.lateral_movement - attack.defense_evasion