Skip to content

Detection of redirection (>) in windows process creation command lines #4277

Closed Answered by nasbench
L015H4CK asked this question in Q&A
Discussion options

You must be logged in to vote

Both 4688 and Sysmon EID1 aren't capable of catching those CLI for the simple purpose that the > character is considered as a pipe character and actually is piping results from one command to another. The detection using it are focusing on the usage of the "/c" flag before hand. For example.

cmd /c "whoami /all > C:\Temp\whoami.txt" will be logged as a single command.

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@L015H4CK
Comment options

Answer selected by nasbench
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants