heroui logo

Linux Auditd Doas Conf File Creation

Splunk Security Content

View Source
Summary
This detection rule monitors the creation of the doas.conf file on Linux systems, which is significant as it enables regular users to execute commands as the root user, essentially granting elevated privileges similar to the sudo command. The rule utilizes Linux Auditd logs to track events associated with the creation of this configuration file. Activities involving the modification or creation of the doas.conf file may indicate potential unauthorized attempts to gain higher privileges, particularly in a compromise scenario where an adversary seeks to escalate their access within the target system. Such escalations can lead to severe security breaches, including full system control by the attacker. The detection mechanism focuses on capturing and analyzing specific syscalls and events related to file path changes in Auditd logs, thereby ensuring timely alerts for unusual or suspicious activities in relation to this critical configuration file.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
  • Network Traffic
  • Scheduled Job
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13