
Summary
This rule is designed to detect shell execution via the GCC (GNU Compiler Collection) utility on Linux systems. The execution of a shell through GCC can indicate potential security risks, such as privilege escalation or unauthorized command execution, especially in environments where restricted shells are enforced. The detection logic is based on the creation of processes with specific command line arguments associated with GCC that indicate an attempt to use the compiler as a shell. These patterns may signify attempts to bypass security restrictions or execute commands that could compromise the integrity of the system. The rule relies on analyzing process creation logs to identify when GCC is being used deliberately in this manner, and applies strict conditions to minimize false positives.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
Created: 2024-09-02