heroui logo

Linux Recon Indicators

Sigma Rules

View Source
Summary
The 'Linux Recon Indicators' rule is designed to detect specific command-line patterns associated with reconnaissance activities on Linux systems. Specifically, it targets the use of the 'find' command with options that suggest unauthorized attempts to locate sensitive files such as '.htpasswd' or the identification of files with the SUID permission (4000). The presence of these patterns can indicate potential credential access or reconnaissance attempts by adversaries seeking to exploit Linux systems. This rule operates within the 'process_creation' log source category of the Linux platform, which means it analyzes the command-line arguments of processes initiated within the system. The detection relies on simple pattern matching within the command line, leveraging the presence of certain arguments that are characteristic of either valid administrative actions or malicious reconnaissance tactics. False positives may arise from legitimate system administration or maintenance activities that also utilize similar command structures. The rule is classified with a high level of severity due to the potential implications of successful reconnaissance activities on system security.
Categories
  • Linux
  • Endpoint
  • Network
Data Sources
  • Process
Created: 2022-06-20