heroui logo

Linux Network Sniffing

Anvilogic Forge

View Source
Summary
This threat detection rule identifies potential network sniffing activities on Linux systems, where an attacker utilizes tools like 'tshark' and 'tcpdump' to capture and analyze network traffic. The rule is designed to help security teams recognize unauthorized network surveillance behavior which could indicate a compromised system. The atomic test corresponding to this detection is T1040, highlighting its relevance to credential access and discovery techniques associated with network sniffing. By monitoring specified data sources, which in this case include Linux audit logs, the detection logic filters and aggregates events over a one-minute timeframe, triggering alerts for any detected use of sniffing tools. This helps facilitate quick responses and containment actions when malicious activities are identified in the network. The rule is a critical component of an organization’s security posture, focusing on visibility and response capabilities within the Linux environment.
Categories
  • Linux
  • Network
  • Endpoint
Data Sources
  • Container
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1040
Created: 2024-02-09