heroui logo

Flush Iptables Ufw Chain

Sigma Rules

View Source
Summary
This detection rule targets the malicious use of the iptables command to flush all firewall rules, tables, and chains on a Linux system, thereby allowing unrestricted network traffic. When executed, the commands `iptables -F`, `iptables -Z`, and `iptables -X` remove all rules from all chains, reset the packet and byte counters, and delete all user-defined chains. The detection rule monitors the creation of processes that initiate the iptables or UFW commands. If the command line arguments contain the flush and reset options, or specific logging options associated with UFW, it triggers the detection. This can indicate an adversary attempting to compromise the firewall's integrity and reconfigure it to enable network access.It's crucial to monitor such actions as they represent significant defense evasion tactics that could lead to unauthorized access or data exfiltration attempts. The rule aims to reduce false positives by considering common administrative activities, particularly from network administrators managing firewall configurations. Ensuring timely alerts on these commands helps in maintaining the security posture of the Linux environments.
Categories
  • Linux
  • Network
Data Sources
  • Process
Created: 2023-01-18