heroui logo

Potential Privilege Escalation via Linux DAC permissions

Elastic Detection Rules

View Source
Summary
This rule, created by Elastic, is designed to detect potential privilege escalation exploits through the misuse of Discretionary Access Control (DAC) permissions in Linux systems. The focus is on identifying suspicious processes that leverage significant privileges granted by certain capabilities such as CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH, which enable a process to bypass standard file permission checks. The rule monitors for events categorized as process executions on Linux hosts, specifically looking for attempts to access sensitive files like 'sudoers', 'passwd', 'shadow', or any files under the '/root/' directory. It excludes benign Activity from commonly trusted processes or user IDs that would normally have such access, such as the root user or specific system management processes. Importantly, the rule integrates with Elastic Defend, which must be appropriately set up on the agent monitoring the endpoints. System administrators are provided with a framework of investigation methods and response strategies should such alerts be triggered, including review protocols, user ID checks, and actions for remediation to minimize potential security risks.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1068
Created: 2024-01-08