
Summary
This detection rule is designed to identify potential password policy discovery activities on Linux systems. It monitors commands that are commonly used to fetch password policy details, such as 'chage', which is invoked with the '--list' or '-l' options to display the password expiration and aging information. The rule also tracks the 'passwd' command with the '-S' or '--status' options to check user account status. By analyzing audit logs, the rule aims to identify unauthorized or suspicious attempts to inspect password policies, which can be an indication of reconnaissance activities prior to a potential attack. Legitimate administrative activities may lead to false positives, indicating the need for careful contextual analysis during investigation. Overall, this detection aims to protect against misuse of administrative commands that could reveal sensitive system security configurations.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Command
- File
ATT&CK Techniques
- T1201
Created: 2020-10-08