heroui logo

Symlink Etc Passwd

Sigma Rules

View Source
Summary
This detection rule identifies potentially harmful command lines that aim to create symbolic links to the critical \"/etc/passwd\" file on Linux systems. The rule specifically looks for commands such as \"ln -s -f /etc/passwd\" or \"ln -s /etc/passwd\", which could indicate an attempt by malicious actors to manipulate user accounts or escalate privileges by altering the way the system reads the passwd file. Such behavior is commonly associated with various attack techniques, including the exploitation of poorly configured permissions or masquerading an attack within legitimate processes. Monitoring for these commands is essential to maintain system integrity and protect against privilege escalation attacks. The rule links to the \"21 NAILS\" page from Qualys where further insights into such security threats can be found. As symbol links can redirect file access in unexpected ways, detecting their creation towards sensitive files is crucial in forensic investigations and for preventing unauthorized access.
Categories
  • Linux
  • Endpoint
Data Sources
  • Command
  • Process
Created: 2019-04-05