
Summary
The Nohup Execution rule is designed to detect the usage of the 'nohup' command in a Linux environment. 'nohup' (short for 'no hangup') allows users to run commands that will continue executing even after the user who invoked them logs out. While this functionality can be beneficial for legitimate administrators managing long-running processes, it can also be exploited by attackers to maintain persistence on a compromised system or to execute malicious commands in a manner that evades detection. The rule identifies instances where processes are created using 'nohup' by monitoring relevant log data for command executions that end with '/nohup'. This detection is particularly significant given the potential misuse of 'nohup' in unauthorized scenarios, such as circumventing process management controls. It is classified with a medium severity level due to its potential implications for maintaining unauthorized access or executing unwanted processes without appropriate oversight.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
Created: 2022-06-06