heroui logo

Cat Sudoers

Sigma Rules

View Source
Summary
The 'Cat Sudoers' detection rule is designed to identify potential reconnaissance activities on Linux systems, specifically when an attacker attempts to display the contents of the '/etc/sudoers' file. This file contains critical information regarding user permissions related to the 'sudo' command, which grants elevated privileges. By leveraging standard command-line utilities such as 'cat', 'grep', 'head', 'tail', or 'more', an attacker can enumerate users with sudo privileges, thus planning potential privilege escalation attacks. This rule captures process creation events that match these conditions, specifically focusing on command lines that include 'cat /etc/sudoers'. Detecting this activity is crucial for immediate response and mitigation of potential security threats, as it indicates preparatory actions leading to unauthorized access attempts.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2022-06-20