heroui logo

Linux Find Privilege Escalation

Splunk Security Content

View Source
Summary
This detection rule is focused on identifying privilege escalation attempts on Linux systems using the 'find' command in combination with 'sudo' and the '-exec' option. The rule analyzes logs generated by Endpoint Detection and Response (EDR) agents, specifically monitoring process execution logs that include command-line arguments. Such command usage may indicate that a user is trying to execute commands with elevated privileges (as root), potentially allowing attackers to gain full control over the system. By detecting these potentially malicious commands, security teams can respond to unauthorized access attempts and mitigate risks associated with privilege escalation. In addition, the rule includes mechanisms to filter out false positives that might arise from legitimate administrative tasks.
Categories
  • Linux
  • Endpoint
Data Sources
  • Script
  • Process
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13