heroui logo

Shell Execution via Find - Linux

Sigma Rules

View Source
Summary
This detection rule is engineered to identify attempts to leverage the `find` command in Linux to execute shell commands. The malicious use of `find` with constructs like `-exec` can indicate attempts at privilege escalation, unauthorized command execution, or exploitation activity. The rule captures command-line invocations of `find` where the command includes specific shell executables such as `bash`, `sh`, `zsh`, among others, especially when used in conjunction with the `-exec` option. Suspicious patterns are flagged under the condition that both the find command and suspicious shell usage are present in the command line, mitigating false positives by relying on combination criteria. This behavior is particularly relevant in contexts where proper permissions should be enforced, and its detection is critical in maintaining the security integrity of Linux systems. The rule is currently marked as experimental, highlighting its ongoing development and refinement phase.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2024-09-02