Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This rule helps to detect usage of Kali Linux in your environment. Attackers might utilize Kali Linux's tools and features for unauthorized penetration testing, reconnaissance, or exploitation attempts.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | Web Session Essentials |
| ID | 05f5cccd-ee93-4293-b7ad-05820aaa54a4 |
| Tactics | Execution |
| Techniques | T1059, T1203 |
| Source | View on GitHub |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊