heroui logo

System and Hardware Information Discovery

Sigma Rules

View Source
Summary
This detection rule focuses on identifying system information discovery commands executed on Linux systems by monitoring specific file accesses that reveal hardware and system details. The rule examines access to paths that indicate various hardware components and system configurations, such as BIOS version, product name, chassis vendor, SCSI devices, IDE models, and system version information. The primary paths monitored include `/sys/class/dmi/id/bios_version`, `/sys/class/dmi/id/product_name`, and others found in the `/proc` and `/etc` directories. By triggering alerts when these paths are accessed, the rule helps in detecting potential reconnaissance activities by attackers who might be attempting to gather information about the system's environment, which could be leveraged in further malicious actions.
Categories
  • Linux
  • Endpoint
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1082
Created: 2020-10-08