• Detections
  • Jun 11, 2021
  • By QOMPLX

QOMPLX Detections: Reference

QOMPLX Detections: Reference

QOMPLX Detections is a reference document that provides essential information on the methods that our technology uses to identify suspicious and malicious activity within your environment.

The posts included in this document describe common attacks and malicious behaviors and the telltale signs that identify them. They are intended to provide basic information and insights about the attack activity and trends that are driving malicious campaigns and that QOMPLX helps its customers to detect and counter.

  1. Understanding Golden SAML Forgery Attack
  2. Understanding Pass The Hash Attacks
  3. Detecting Password Spraying Attacks
  4. Detecting Account Name Enumeration
  5. Detecting Successful Zone Transfer from an Unknown Source
  6. Detecting PowerShell Executed in the Background
  7. Detecting PowerShell Encoded Command Execution
  8. Detecting Use of Built-In Windows Utilities
  9. Detecting Service Installed on Sensitive Systems
  10. Detecting Suspicious Use of Regsvr32
  11. Detecting ASREP Roasting Attacks
  12. QOMPLX Knowledge: Honey Account Logins and Ticket Requests
  13. QOMPLX Knowledge: Detecting Pass The Hash Attacks
  14. QOMPLX Knowldge: Detecting Skeleton Key Attacks

You might also be interested in

A Golden Ticket Attack on Active Directory Federated Services

A Golden Ticket Attack on Active Directory Federated Services

In an industry that is rapidly moving towards identity-centric security, ADFS became a popular solution for providing smooth workflows to employees. However, the reality is that identity-based attacks have evolved that pinpoint specific weaknesses within ADFS.

Read more
Kerberos Fundamentals

Kerberos Fundamentals

Recently developed and readily available tools have revealed a fundamental vulnerability in Kerberos’ inability to validate its own ticket exchanges.

Read more
The Importance of Lateral Movement Detection

The Importance of Lateral Movement Detection

Many of the most devastating attacks today rely heavily on privilege escalation and undetected lateral movement to obtain incrementally greater access to resources and services. These techniques typically involve exploitation of known vulnerabilities in the Kerberos protocol...

Read more
Request a Demo

Interested in learning more?

Subscribe today to stay informed and get regular updates from QOMPLX.