JNDIExploit Pattern

Detects exploitation attempt using the JNDI-Exploit-Kit

Sigma rule (View on GitHub)

 1title: JNDIExploit Pattern
 2id: 412d55bc-7737-4d25-9542-5b396867ce55
 3status: test
 4description: Detects exploitation attempt using the JNDI-Exploit-Kit
 5references:
 6    - https://github.com/pimps/JNDI-Exploit-Kit
 7    - https://githubmemory.com/repo/FunctFan/JNDIExploit
 8author: Florian Roth (Nextron Systems)
 9date: 2021/12/12
10modified: 2022/12/25
11tags:
12    - attack.initial_access
13    - attack.t1190
14logsource:
15    category: webserver
16detection:
17    keywords:
18        - '/Basic/Command/Base64/'
19        - '/Basic/ReverseShell/'
20        - '/Basic/TomcatMemshell'
21        - '/Basic/JettyMemshell'
22        - '/Basic/WeblogicMemshell'
23        - '/Basic/JBossMemshell'
24        - '/Basic/WebsphereMemshell'
25        - '/Basic/SpringMemshell'
26        - '/Deserialization/URLDNS/'
27        - '/Deserialization/CommonsCollections1/Dnslog/'
28        - '/Deserialization/CommonsCollections2/Command/Base64/'
29        - '/Deserialization/CommonsBeanutils1/ReverseShell/'
30        - '/Deserialization/Jre8u20/TomcatMemshell'
31        - '/TomcatBypass/Dnslog/'
32        - '/TomcatBypass/Command/'
33        - '/TomcatBypass/ReverseShell/'
34        - '/TomcatBypass/TomcatMemshell'
35        - '/TomcatBypass/SpringMemshell'
36        - '/GroovyBypass/Command/'
37        - '/WebsphereBypass/Upload/'
38    condition: keywords
39falsepositives:
40    - Legitimate apps the use these paths
41level: high

References

Related rules

to-top