
Summary
The detection rule titled "Linux Auditd Setuid Using Chmod Utility" identifies the execution of the 'chmod' utility used to set the SUID or SGID bits on files in a Linux environment. This capability allows users to elevate privileges to root or group-level access potentially, posing a significant threat if misused. The rule monitors `linux_auditd` data and specifically looks at command-line arguments associated with 'chmod' to catch any attempts indicating privilege escalation or persistence. Key conditions for triggering the alert are the presence of 'chmod' in the command executed alongside flags that indicate setting SUID (`u+s`) or SGID (`g+s`). To implement this detection, logs from Linux Auditd, which capture process execution details, must be ingested and parsed correctly within a SIEM environment, specifically using the Splunk platform. The rule aims to enhance security monitoring against Linux-based threats, particularly those exploiting the chmod utility for illicit purposes.
Categories
- Linux
- Endpoint
Data Sources
- Kernel
- Process
- File
ATT&CK Techniques
- T1548.001
- T1548
Created: 2024-11-13