heroui logo

Print History File Contents

Sigma Rules

View Source
Summary
This rule is designed to detect instances where users print the contents of history files on Linux systems through commands like 'cat', 'head', 'tail', or 'more'. This activity is often associated with reconnaissance efforts, as attackers may seek to identify previously executed commands to gain insights into user behavior or system configurations. The rule inspects for process creation events related to the printing of history files, specifically looking for command line arguments that include common history file patterns such as '.bash_history', '.zsh_history', or any file ending with '_history', '.history', or 'zhistory'. The detection condition ensures that all specified selection criteria must be met for the rule to trigger an alert, thereby enhancing accuracy and reducing false positives. This is particularly significant as legitimate administrative tasks might ordinarily involve accessing these files, thus warranting careful monitoring and contextual analysis of detected activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1552.003
Created: 2022-06-20