• Back


QOMPLX Detections: Reference

QOMPLX Detections is a reference document that provides essential information on the methods that our technology uses to identify suspicious and malicious activity within your environment.

The posts included in this document describe common attacks and malicious behaviors and the telltale signs that identify them. They are intended to provide basic information and insights about the attack activity and trends that are driving malicious campaigns and that QOMPLX helps its customers to detect and counter.

  1. Understanding Golden SAML Forgery Attack
  2. Understanding Pass The Hash Attacks
  3. Detecting Password Spraying Attacks
  4. Detecting New Members Added To Sensitive Groups
  5. Detecting Account Name Enumeration
  6. Detecting Successful Zone Transfer from an Unknown Source
  7. Detecting PowerShell Executed in the Background
  8. Detecting PowerShell Encoded Command Execution
  9. Detecting Use of Built-In Windows Utilities
  10. Detecting Service Installed on Sensitive Systems
  11. Detecting Suspicious Use of Regsvr32
  12. Detecting ASREP Roasting Attacks
  13. QOMPLX Knowledge: Honey Account Logins and Ticket Requests
  14. QOMPLX Knowledge: Detecting Pass The Hash Attacks
  15. QOMPLX Knowldge: Detecting Skeleton Key Attacks

More Posts

Card image cap
Attack surface risk signals: DNS records

Published Oct 14, 2021

Card image cap
Identify and Fight the Phish #CyberMonth

Published Oct 12, 2021

Card image cap
Offensive Security Service Data Sheet

Published Sep 28, 2021

Card image cap
Offensive Security Service Tech Spec

Published Sep 28, 2021