Skip to content

Commit 3087d78

Browse files
authored
Update Named Pipe in Sysmon.md
Update Named Pipe in Sysmon.md
1 parent d0196aa commit 3087d78

1 file changed

Lines changed: 22 additions & 6 deletions

File tree

Sysmon.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1135,9 +1135,16 @@ Example monitoring for script file creation by extension:
11351135

11361136
## Named Pipes
11371137

1138-
A named pipe is a named, one-way or duplex pipe for communication between the pipe server and one or more pipe clients. Each named pipe has a unique name that distinguishes it from other named pipes in the system\'s list of named objects. Pipe names are specified as \\\\ServerName\\pipe\\PipeName when connection is local a "." would be used as ServerName.
1138+
A named pipe is a named, one-way or duplex pipe for communication
1139+
between the pipe server and one or more pipe clients. Each named pipe
1140+
has a unique name that distinguishes it from other named pipes in the
1141+
system\'s list of named objects. Pipe names are specified as
1142+
\\\\ServerName\\pipe\\PipeName when connection is local a "." would be
1143+
used as ServerName.
11391144

1140-
Named pipes are used for pivoting in several RATs/Implants to have SMB connections between machines. Some tools will use named pipes to talk to injected code in other processes.
1145+
Named pipes are used for pivoting in several RATs/Implants to have SMB
1146+
connections between machines. Some tools will use named pipes to talk to
1147+
injected code in other processes.
11411148

11421149
Sysmon will generate a events
11431150

@@ -1151,7 +1158,11 @@ For named pipes there are 2 approaches that can be taken:
11511158

11521159
* Include only known malicious actors.
11531160

1154-
The first approach requires more maintenance but in case of a breach offers more value. The second one would be more targeted but this kind of detection is better served with automation in the SIEM. Experienced attackers normally avoid known Pipes to prevent breaking normal operation of the system applications.
1161+
The first approach requires more maintenance but in case of a breach
1162+
offers more value. The second one would be more targeted but this kind
1163+
of detection is better served with automation in the SIEM. Experienced
1164+
attackers normally avoid known Pipes to prevent breaking normal
1165+
operation of the system applications.
11551166

11561167
The process for PipeName values should be constant process.
11571168

@@ -1193,7 +1204,8 @@ The fields for the Pipe Create Event are:
11931204

11941205
* **ProcessGuid**: Process Guid of the process that created the pipe
11951206

1196-
* **ProcessId**: Process ID used by the OS to identify the process that created the pipe
1207+
* **ProcessId**: Process ID used by the OS to identify the process
1208+
that created the pipe
11971209

11981210
* **PipeName**: Name of the pipe created
11991211

@@ -1209,7 +1221,8 @@ The fields for the Pipe Connect Event are:
12091221

12101222
* **ProcessGuid**: Process Guid of the process that connected the pipe
12111223

1212-
* **ProcessId**: Process ID used by the OS to identify the process that connected the pipe
1224+
* **ProcessId**: Process ID used by the OS to identify the process
1225+
that connected the pipe
12131226

12141227
* **PipeName**: Name of the pipe connected
12151228

@@ -1250,7 +1263,10 @@ Example excluding known good Pipe Names
12501263
</Sysmon>
12511264
```
12521265

1253-
One thing to consider is that Sysmon uses a minifilter just like the file events, any AV or EDR with a higher altitude number if it triggers on the named pipe and block Sysmon will not log the event.
1266+
One thing to consider is that Sysmon uses a minifilter just like the
1267+
file events. If any AV or EDR with a lower altitude number triggers
1268+
on a named pipe and blocks it, Sysmon will not log the event.
1269+
12541270

12551271
## Driver Loading
12561272

0 commit comments

Comments
 (0)