heroui logo

Linux Auditd Setuid Using Setcap Utility

Splunk Security Content

View Source
Summary
This analytic detection rule monitors the execution of the 'setcap' utility on Linux systems to enable the SUID (Set User ID) bit, which could allow users to elevate privileges and increase the potential for unauthorized access to sensitive resources. Utilizing Linux Auditd data, the rule pushes for scrutiny of process names and command-line arguments specific to 'setcap'. By doing this, it aims to catch instances where the SUID bit is set improperly, which poses a considerable risk of privilege escalation and system compromise. This is especially sensitive given the capabilities that can be added via the command, such as `cap_setuid+ep`, allowing users to execute commands with root-like permissions. This detection method focuses on tracking the usage and patterns of the command, thereby enabling responsive actions to remediate potential threats.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Process
  • File
ATT&CK Techniques
  • T1548.001
  • T1548
Created: 2025-01-16