
Summary
This detection rule identifies suspicious command executions via a web server, indicative of potential vulnerabilities and remote shell access. Attackers may exploit vulnerabilities in web applications to execute commands through a web server or implant backdoor files to ensure persistence. The rule leverages various Osquery queries to examine processes and network activity that deviate from normal behaviors. It focuses on processes executed as children of common web server applications (like nginx and apache) and checks for suspicious command-line arguments that are often associated with exploitation techniques (e.g., 'curl', 'wget', 'bash'). If such behaviors are detected, it suggests that an attacker may have successfully executed a web shell on the compromised system. The severity of this rule is set to high due to the potential impact on system integrity and security.
Categories
- Endpoint
- Web
- Linux
Data Sources
- Process
- Network Traffic
- Application Log
ATT&CK Techniques
- T1505
- T1505.003
- T1190
Created: 2023-03-04