
Summary
This detection rule targets the execution of the Netcat utility with specific command line flags that suggest a potential reverse shell setup. Reverse shells are a common method used by attackers to gain remote access to a compromised system. The rule looks for instances where Netcat (either 'nc' or 'ncat') is executed with the '-e' or '-c' options paired with common shell interpreters like bash, sh, and others. The selection criteria ensure that all conditions must be met for the rule to trigger, thereby minimizing false positives. Given the high-risk level associated with reverse shells, proper monitoring and quick response to alerts generated by this rule is crucial for maintaining system security.
Categories
- Linux
- Endpoint
Data Sources
- Process
Created: 2023-04-07