
Summary
The detection rule analyzes Cisco ASA (Adaptive Security Appliance) logs to identify potentially malicious execution of packet capture commands via the command-line interface (CLI) or ASDM (Adaptive Security Device Manager). Packet captures are a critical function within Cisco ASA that can be exploited by adversaries to intercept sensitive information such as usernames, passwords, session tokens, and confidential business data. Unauthorized packet capture sessions may provide insight into network traffic patterns and internal communications, posing significant risks, particularly if conducted on sensitive interfaces (like internal networks or DMZs) or during odd hours. This rule captures events with specific message IDs that correspond to packet capture commands to facilitate monitoring and response. The search query looks for command executions containing "capture" on the ASA device, helping to detect unauthorized command activities. Implementation necessitates appropriate logging configurations to ensure visibility into these critical events, and it includes guidance on settings adjustments for effective monitoring.
Categories
- Network
- Cloud
- Infrastructure
Data Sources
- Cloud Service
- Network Traffic
- Logon Session
ATT&CK Techniques
- T1040
- T1557
Created: 2025-11-18