heroui logo

Linux Enumeration Techniques

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying potential enumeration techniques used by attackers on Linux systems. Once an attacker gains initial access through a limited shell, they aim to escalate privileges. The rule attributes various enumeration activities to the threat 'Watch Dog'. It involves monitoring system commands executed and particularly looks for specific interactions with the Pluggable Authentication Modules (PAM) related to credential acquisition, account access, and session management. Key indicators include access attempts to sensitive commands and scripts, network configurations, and user/group information retrieval. The logic leverages Splunk's capabilities to gather endpoint data, filtering for events that match behaviors typically associated with enumeration during an attack phase. The output table highlights crucial context like time, host, user, and process details, all of which help in assessing the legitimacy of user actions or identifying malicious intent quickly.
Categories
  • Linux
  • Endpoint
  • Cloud
Data Sources
  • Process
  • Command
ATT&CK Techniques
  • T1059.004
  • T1087
  • T1083
  • T1069
  • T1082
  • T1016
  • T1049
  • T1033
  • T1119
Created: 2024-02-09