
Summary
The rule detects potential abuse of the Linux Magic System Request (SysRq) key, which can be exploited by attackers with root or sufficient privileges to perform unauthorized actions on a system. The SysRq key allows for various low-level commands that can influence system operations directly through the /proc/sysrq-trigger interface. Adversaries can leverage this functionality to crash systems, terminate processes, or hinder forensic investigations without leaving footprints in standard logging mechanisms. The intended use of SysRq is for recovery, but its misuse for post-exploitation can raise serious security concerns. Detection relies on specific auditd configurations that monitor changes to key files associated with SysRq, to catch any unauthorized attempts to use its features.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
- Kernel
Created: 2025-05-23