Detect Kali Linux UserAgent (ASIM Web Session)

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This rule helps to detect usage of Kali Linux in your environment. Attackers might utilize Kali Linux's tools and features for unauthorized penetration testing, reconnaissance, or exploitation attempts.

Attribute Value
Type Hunting Query
Solution Web Session Essentials
ID 05f5cccd-ee93-4293-b7ad-05820aaa54a4
Tactics Execution
Techniques T1059, T1203
Source View on GitHub

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Web Session Essentials