
Summary
This detection rule is designed to identify potential command execution activities that may occur through a web application or a web shell on Linux systems. It focuses on capturing syscall events, specifically the 'execve' syscall, which is commonly used to execute files directly. The rule uses an entry in auditd to monitor for suspicious execution commands that originate from potentially compromised web applications, indicating a successful exploitation of a webshell. A critical level is assigned as the impact of such activities can lead to significant breaches in security, allowing attackers to maintain persistence or escalate their privileges within the environment. Administrators should be aware that legitimate administrative tasks and certain atypical web application behaviors may lead to false positives, which are noted in the rule documentation. Proper tuning and context-awareness in monitoring are recommended to filter out these benign operations effectively.
Categories
- Web
- Linux
Data Sources
- Process
- File
Created: 2019-10-12