Files
blue-team-tools/rules/linux/builtin/lnx_buffer_overflows.yml
T

24 lines
712 B
YAML
Raw Normal View History

2017-03-01 08:38:33 +01:00
title: Buffer Overflow Attempts
2019-11-12 23:12:27 +01:00
id: 18b042f0-2ecd-4b6e-9f8d-aa7a7e7de781
2020-09-13 22:03:04 -06:00
status: stable
2018-08-25 00:20:34 +02:00
description: Detects buffer overflow attempts in Unix system log files
references:
2022-07-07 15:24:15 +01:00
- https://github.com/ossec/ossec-hids/blob/1ecffb1b884607cb12e619f9ab3c04f530801083/etc/rules/attack_rules.xml
2023-02-01 11:14:59 +01:00
author: Florian Roth (Nextron Systems)
2022-10-25 08:53:44 +02:00
date: 2017/03/01
tags:
- attack.t1068
- attack.privilege_escalation
2017-03-01 08:38:33 +01:00
logsource:
2022-03-24 11:40:51 +01:00
product: linux
2017-03-01 08:38:33 +01:00
detection:
keywords:
- 'attempt to execute code on stack by'
- 'FTP LOGIN FROM .* 0bin0sh'
- 'rpc.statd[\d+]: gethostbyname error for'
- 'AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'
condition: keywords
falsepositives:
- Unknown
2017-03-01 08:38:33 +01:00
level: high