
Summary
This detection rule monitors the invocation of the `sudo -l` command on Linux systems, which is used to list commands that the invoking user is allowed to run with sudo privileges. By executing `sudo -l`, attackers can gather information about allowable commands, potentially identifying ways to escalate privileges to root. The rule utilizes Elastic Query Language (EQL) to detect the following conditions: the process type must be 'linux', the event type should be 'start', and the command must be associated with `sudo` specifically invoked with the `-l` argument and a parent process from a list of standard shell environments. Additionally, a check ensures that the execution does not originate from `dpkg`, which is a known benign context. The rule is set to trigger at a low risk score of 21, making it important for monitoring emerging threats while reducing false positives from legitimate administrative actions.
Categories
- Endpoint
Data Sources
- Process
- Command
- Logon Session
ATT&CK Techniques
- T1033
Created: 2023-08-30