Skip to content

Commit

Permalink
Create link_hidden_dir.yml
Browse files Browse the repository at this point in the history
  • Loading branch information
zoomequipd authored Dec 27, 2024
1 parent 1d64485 commit f669bd4
Showing 1 changed file with 34 additions and 0 deletions.
34 changes: 34 additions & 0 deletions detection-rules/link_hidden_dir.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
name: "Link: Common Hidden Directory Observed"
description: "Links in the message point to sensitive system directories like .git, .env, or .well-known that could expose confidential configuration data or system files. Actors will often abuse these directories to hide credential phishing landing pages of compromised sites."
type: "rule"
severity: "medium"
source: |
type.inbound
and length(body.links) < 10
and any(body.links,
(
strings.icontains(.href_url.path, "/.well-known/")
and not strings.icontains(.href_url.path, '/.well-known/security.txt')
)
or strings.icontains(.href_url.path, "/.js/")
or strings.icontains(.href_url.path, "/.env/")
or strings.icontains(.href_url.path, "/.git/")
or strings.icontains(.href_url.path, "/.svn/")
or strings.icontains(.href_url.path, "/.hg/")
or strings.icontains(.href_url.path, "/.DS_Store/")
or strings.icontains(.href_url.path, "/.htpasswd/")
or strings.icontains(.href_url.path, "/.htaccess/")
or strings.icontains(.href_url.path, "/.bash_history/")
or strings.icontains(.href_url.path, "/.bashrc/")
or strings.icontains(.href_url.path, "/.zshrc/")
or strings.icontains(.href_url.path, "/.profile/")
)
tags:
- "Attack surface reduction"
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Evasion"
detection_methods:
- "URL analysis"
- "HTML analysis"

0 comments on commit f669bd4

Please sign in to comment.