- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects execution of Mimikatz credential dumping tool through PowerShell scripts.
This rule monitors Windows event logs for PowerShell script block execution containing known Mimikatz commands and functions. It triggers when detecting PowerShell commands containing specific function names and command patterns commonly associated with Mimikatz operations. Mimikatz is a well-known credential dumping tool that extracts plaintext passwords, hashes, PIN codes, and Kerberos tickets from memory. The tool is commonly used by attackers after gaining initial access to extract credentials for lateral movement, privilege escalation, and persistence. Detection of these script patterns indicates an active attempt to harvest credentials from the system.
{{host}}
to verify the Mimikatz execution attempt and understand its full context.