Skip to content

Detecting Responder-like Attacks

Search by Sysmon Event ID 22

We can use Sysmon Event ID 22 to track the DNS queries associated with non-existent or mistyped file shares to detect possible Responder-like attacks.

Splunk Query

index=main EventCode=22 
| table _time, Computer, user, Image, QueryName, QueryResults

Search by Windows Event ID 4648

We can also use Windows Security Event ID 4648 (A logon was attempted using explicit credentials.) to detect explicit logons to rogue file shares which attackers might use to gather legitimate user credentials.

Splunk Query

index=main EventCode IN (4648) 
| table _time, EventCode, source, name, user, Target_Server_Name, Message
| sort 0 _time