
Summary
This detection rule identifies actions taken to disable security tools on Linux systems, specifically focusing on commands and log entries related to stopping key security services such as iptables, ip6tables, firewalld, cbdaemon, and falcon-sensor. The keywords defined for this rule target specific processes and commands that are often associated with the disabling of security functionality within a system. Such activities may be indicative of malicious behavior attempting to bypass protective measures. The rule monitors syslog for these keywords, which are logged during the execution of commands that could compromise the system's security posture. This is critical in threat hunting and forensics, particularly in environments where integrity and security monitoring are paramount.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Logon Session
- Process
- Application Log
- Network Traffic
ATT&CK Techniques
- T1562.004
Created: 2020-06-17