
Summary
The "ESXi Reverse Shell Patterns" detection rule is designed to identify potential reverse shell activities on VMware ESXi hosts, which could indicate that threat actors are trying to gain remote control of these systems. The detection leverages system logs from the ESXi environment, specifically searching for suspicious command patterns typically associated with reverse shells. Such patterns might include common shell commands like invoking bash in interactive mode with redirects, socket connections, and Python scripts utilizing socket imports. The rule utilizes a Splunk search that combines pattern matching with regex field extraction to isolate destination IP addresses involved in these commands, providing insights into the source and timing of potential attacks. Implementing this detection requires proper configuration of syslog data forwarding from ESXi servers to Splunk, along with necessary field extractions for effective analysis. It is advised to review the results for false positives and adjust tuning as necessary for the specific environment.
Categories
- Infrastructure
Data Sources
- Pod
- Container
- User Account
- Script
ATT&CK Techniques
- T1059
Created: 2025-05-12