Press ESC to close

Detecting WiFi dumping via direct WinAPI calls and introduction to “Immutable Artifacts”

AspectDetails
ChallengeTraditional detections rely on mutable artifacts (e.g., netsh.exe usage).
GoalIdentify immutable artifacts generated during WiFi credential dumps via direct API calls.
Key ToolsWindows Event Viewer, Sysmon, Procmon, Custom C code for API-based WiFi credential dump.
API Method Observations– No registry read/write logs.
– No file read logs on WiFi profile storage paths.
– No process creation logs for netsh.
Sysmon Event ID 7 UseDetects executables loading wlanapi.dll. Requires enabling Event ID 7 by modifying Sysmon configuration.
Configuration ChangeModify Sysmon config: Change Event ID 7 from exclude to include for ImageLoad.
Detection RuleSysmon Event ID 7 where ImageLoaded = wlanapi.dll and Image contains .exe not in baseline. Requires baselining for legitimate activity.
Password Dump DetectionMonitor Crypto-DPAPI Event ID 16385 for calls to CryptUnprotect. Correlate with caller process (e.g., PowerShell).
Recommended TelemetryEnable Sysmon Event ID 7 and Crypto-DPAPI Event ID 16385. Adjust configurations to reduce noise.
Key InsightImmutable artifacts, such as DLL loads or API calls (e.g., wlanapi.dll or CryptUnprotect), are essential for detecting advanced attacker methods.

Read full article: https://detect.fyi/detecting-wifi-dumping-via-direct-winapi-calls-and-introduction-to-immutable-artifacts-8ad0661344c1

Disclaimer: The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *