
Summary
This rule monitors syslog log files for entries indicating that processes are started with an executable stack, which can be a potential security risk allowing malicious code execution from the stack. It specifically looks for messages related to the kernel and flags any such activity for further investigation. The primary data source for this rule is syslog which captures the relevant events that indicate abnormal process behavior. It is crucial for organizations operating Linux systems to implement this detection to enhance their security posture and recognize potentially exploitative actions earlier. The current implementation involves Filebeat for shipping logs, and users must ensure that the Filebeat System Module is enabled for accurate data collection. The rule focuses on identifying exceptions where benign processes may trigger alerts and outlines a pragmatic response framework to investigate, analyze, and remediate any flagged activities effectively, thereby reducing risk from potential adversaries exploiting executable stack vulnerabilities.
Categories
- Endpoint
- Linux
Data Sources
- Logon Session
- File
ATT&CK Techniques
- T1059
- T1059.004
Created: 2025-01-07