heroui logo

Linux GDB Privilege Escalation

Splunk Security Content

View Source
Summary
The rule titled 'Linux GDB Privilege Escalation' detects attempts to escalate privileges on Linux systems through the misuse of the GNU Debugger (GDB). By utilizing Endpoint Detection and Response (EDR) telemetry, the detection focuses specifically on processes where GDB is executed with the flags `-nx`, `-ex`, and `sudo`. This particular combination is indicative of actions that could enable a user to run system commands with root privileges, thus posing a potential security threat. The rule is configured to use Sysmon for Linux to track such executions and analyzes them against a defined search query that checks for the presence of the malicious flags in GDB commands. If a match is found, this constitutes a significant risk, potentially leading to full system compromise. This rule requires an appropriate ingestion of logs that document command-line executions and relevant process details. It emphasizes the necessity of normalizing log data to align with the Splunk Common Information Model (CIM), enhancing the detection efficacy. The potential for false positives exists, necessitating additional filtering based on specific operational contexts.
Categories
  • Linux
  • Endpoint
  • Infrastructure
Data Sources
  • Active Directory
  • Process
  • File
  • Command
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13