title: Metasploit SMB Authentication description: Alerts on Metasploit host's authentications on the domain. status: experimental id: 72124974-a68b-4366-b990-d30e0b2a190d author: Chakib Gzenayi (@Chak092), Hosni Mribah date: 2020/05/06 modified: 2021/07/07 references: - https://github.com/rapid7/metasploit-framework/blob/master/lib/rex/proto/smb/client.rb tags: - attack.lateral_movement - attack.t1021.002 logsource: product: windows service: security detection: selection1: EventID: - 4625 - 4624 LogonType: 3 AuthenticationPackageName: 'NTLM' WorkstationName|re: '^[A-Za-z0-9]{16}$' selection2: ProcessName: EventID: 4776 Workstation|re: '^[A-Za-z0-9]{16}$' condition: selection1 or selection2 falsepositives: - Linux hostnames composed of 16 characters. level: high