heroui logo

Cisco Show Commands Input

Sigma Rules

View Source
Summary
This detection rule monitors Cisco devices for specific commands that may reveal sensitive information regarding user interactions with the command line interface (CLI). The primary focus is on commands such as 'show history', 'show history all', and 'show logging', which can expose historical command inputs that might include full credentials. By capturing this data, an organization can identify unauthorized access attempts and credential exposure. The rule targets log entries from the 'aaa' service (authentication, authorization, and accounting) in Cisco environments, making it essential for detecting credential access and promoting secure management practices. Monitoring these commands ensures that any unusual or unauthorized command usage is flagged promptly, enhancing overall security posture against potential breaches. Care should be taken to analyze results, as commands may be executed during legitimate administrative sessions.
Categories
  • Network
  • Endpoint
  • Infrastructure
Data Sources
  • Command
  • Logon Session
Created: 2019-08-11