Skip to content

Commit 3dbc72f

Browse files
authored
Merge pull request #3378 from splunk/v5.1.1
Updating lookup 5.1.1
2 parents f0857d6 + 6e84f4c commit 3dbc72f

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

contentctl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.1.0
6+
version: 5.1.1
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU

lookups/malicious_powershell_strings.csv

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ command,toolkit,match,description
1616
*Invoke-TokenManipulation*,PowerSploit,Invoke-TokenManipulation,"Lists available logon tokens. Creates processes with other users logon tokens, and impersonates logon tokens in the current thread."
1717
*Invoke-CredentialInjection*,PowerSploit,Invoke-CredentialInjection,Create logons with clear-text credentials without triggering a suspicious Event ID 4648 (Explicit Credential Logon).
1818
*Invoke-NinjaCopy*,PowerSploit,Invoke-NinjaCopy,Copies a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.
19-
*Invoke-Mimikatz*,PowerSploit,Invoke-Mimikatz,Reflectively loads Mimikatz 2.0 in memory using PowerShell. Can be used to dump credentials without writing anything to disk. Can be used for any functionality provided with Mimikatz.
19+
*Invoke-Mimikatz*,PowerSploit,Invoke-Mimikatz,Reflectively loads Mimikatz 2.0 in memory using PowerShell. Can be used to extract sensitive credentials without writing anything to disk. Can be used for any functionality provided with Mimikatz.
2020
*Get-Keystrokes*,PowerSploit,Get-Keystrokes,"Logs keys pressed, time and the active window."
2121
*Get-GPPPassword*,PowerSploit,Get-GPPPassword,Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences.
2222
*Get-GPPAutologon*,PowerSploit,Get-GPPAutologon,Retrieves autologon username and password from registry.xml if pushed through Group Policy Preferences.

lookups/malicious_powershell_strings.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: malicious_powershell_strings
2-
date: 2025-01-20
3-
version: 1
2+
date: 2025-03-03
3+
version: 2
44
id: d2fcf9eb-c7a4-4b05-9db4-99c6430d0513
55
author: Steven Dick
66
lookup_type: csv

0 commit comments

Comments
 (0)