
Summary
The Linux AWK Privilege Escalation detection rule is designed to identify potential privilege escalation attempts on Linux systems by monitoring the execution of the 'awk' command in conjunction with 'sudo'. This analytic leverages Endpoint Detection and Response (EDR) telemetry, focusing specifically on processes that contain 'sudo', 'awk', and 'BEGIN*system' in their command lines. The detection is particularly significant as it pertains to instances where users attempt to gain unauthorized root access by executing system commands, which could potentially lead to full system compromise. The rule processes data from Sysmon for Linux, correlating the necessary attributes to determine if an abnormal escalation is taking place.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
ATT&CK Techniques
- T1548.003
- T1548
Created: 2024-11-13