
Summary
This detection rule is designed to identify the use of network sniffing tools on Linux systems, specifically focusing on the execution of the 'tcpdump' and 'tshark' commands. Network sniffing involves monitoring data packets traveling over a network, potentially allowing an adversary to capture sensitive data such as credentials or other valuable information. This detection leverages Linux's audit framework to flag execution commands that include typical flags associated with network sniffing operations, such as '-c' for packet count and '-i' for specifying the network interface. The detection looks for specific executions of these tools to ascertain if network reconnaissance is occurring, which is crucial for uncovering potential malicious activity within the network environment. The rule recognizes the potential for false positives, particularly in cases where legitimate administrators may use these tools for benign purposes, such as network diagnostics or performance monitoring. To mitigate this, additional context or user behaviors may need to be analyzed alongside the alerts generated by this rule.
Categories
- Linux
- Network
- Endpoint
Data Sources
- Process
- Logon Session
- Application Log
ATT&CK Techniques
- T1040
Created: 2019-10-21