Platform | Author | Last Update |
---|
aws | Nick Jones | 2024-12-02 |
An attacker may attempt to enumerate the rulesets applied to any configured WAFs, to aid further exploitation of applications
MITRE IDs
Required Permissions
Required Parameters
None
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following Lucene query can be used to identify relevant events.
Sigma Definition