Fix auditd field name
This commit is contained in:
+2
-1
@@ -3,6 +3,7 @@ id: 865c10a6-9541-4d11-9f45-9a3484e23b0a
|
||||
description: Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx*. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager. Microsoft Azure, and Microsoft Operations Management Suite.
|
||||
status: experimental
|
||||
date: 2021/09/18
|
||||
modified: 2021/11/11
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
@@ -21,7 +22,7 @@ logsource:
|
||||
detection:
|
||||
selection:
|
||||
type: 'SYSCALL'
|
||||
SYSCALL: 'execve'
|
||||
syscall: 'execve'
|
||||
uid: '0'
|
||||
cwd: '/var/opt/microsoft/scx/tmp'
|
||||
cmdline|contains: /etc/opt/microsoft/scx/conf/tmpdir/scx
|
||||
@@ -3,6 +3,7 @@ id: 045b5f9c-49f7-4419-a236-9854fb3c827a
|
||||
description: Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager. Microsoft Azure, and Microsoft Operations Management Suite.
|
||||
status: experimental
|
||||
date: 2021/09/17
|
||||
modified: 2021/11/11
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
@@ -20,7 +21,7 @@ logsource:
|
||||
detection:
|
||||
selection:
|
||||
type: 'SYSCALL'
|
||||
SYSCALL: 'execve'
|
||||
syscall: 'execve'
|
||||
uid: '0'
|
||||
cwd: '/var/opt/microsoft/scx/tmp'
|
||||
comm: 'sh'
|
||||
@@ -28,4 +29,3 @@ detection:
|
||||
falsepositives:
|
||||
- Legitimate use of SCX RunAsProvider Invoke_ExecuteShellCommand.
|
||||
level: high
|
||||
|
||||
|
||||
@@ -4,17 +4,16 @@ status: experimental
|
||||
description: Detects possible command execution by web application/web shell
|
||||
author: Ilyas Ochkov, Beyu Denis, oscd.community
|
||||
date: 2019/10/12
|
||||
modified: 2019/11/04
|
||||
modified: 2021/11/11
|
||||
references:
|
||||
- personal experience
|
||||
|
||||
logsource:
|
||||
product: linux
|
||||
service: auditd
|
||||
detection:
|
||||
selection:
|
||||
type: 'SYSCALL'
|
||||
SYSCALL: 'execve'
|
||||
syscall: 'execve'
|
||||
key: 'detect_execve_www'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
|
||||
Reference in New Issue
Block a user