@DebugPrivilege
DebugPrivilege
2 years
Loading (malicious) IIS Modules as backdoor can be detected! Make sure to enable 'Microsoft-Windows-IIS-Configuration/Operational' :)
Tweet media one
6
62
219

Replies

@0gtweet
Grzegorz Tworek
2 years
@DebugPrivilege But why use modules, if IIS can do the same without any single 3rd party binary?
1
2
15
@DebugPrivilege
DebugPrivilege
2 years
@0gtweet I don’t know 🤷‍♂️. Trying to tackle problem one by one. I was focusing on
1
1
10
@bh4b3sh
Bhabesh
2 years
@DebugPrivilege Important to note that IIS Configuration auditing (requires v 7.5+) is not enabled by default.
1
1
0
@DebugPrivilege
DebugPrivilege
2 years
@bh4b3sh Yes, I know. I just stated in the tweet to “enable” this.
0
0
2
@wahyusas
WhyS
2 years
1
0
0
@gl4ssesbo1
Bleon Proko
2 years
0
0
1
@keydet89
Harbulary Battery
2 years
@DebugPrivilege @cyb3rops IMHO, this might be valuable. "They staged the ransomware executable on a domain controller and then used BITSAdmin to download it to each system in the domain." Ques 1: Why was the DC running IIS? /1
3
1
3