Update lnx_auditd_susp_C2_commands.yml
This commit is contained in:
@@ -1,12 +1,7 @@
|
||||
title: Suspicious C2 Activities
|
||||
id: f7158a64-6204-4d6d-868a-6e6378b467e0
|
||||
status: experimental
|
||||
description: Detects suspicious activities as declared by Florian Roth in its 'Best Practice Auditd Configuration'.
|
||||
This includes the detection of the following commands; wget, curl, base64, nc, netcat, ncat, ssh, socat, wireshark, rawshark, rdesktop, nmap
|
||||
These commands match a few techniques from the tactics "Command and Control", including not exhaustively the following;
|
||||
Application Layer Protocol (T1071)
|
||||
Non-Application Layer Protocol (T1095)
|
||||
Data Encoding (T1132)
|
||||
description: Detects suspicious activities as declared by Florian Roth in its 'Best Practice Auditd Configuration'. This includes the detection of the following commands; wget, curl, base64, nc, netcat, ncat, ssh, socat, wireshark, rawshark, rdesktop, nmap. These commands match a few techniques from the tactics "Command and Control", including not exhaustively the following; Application Layer Protocol (T1071), Non-Application Layer Protocol (T1095), Data Encoding (T1132)
|
||||
references:
|
||||
- 'https://github.com/Neo23x0/auditd'
|
||||
date: 2020/05/18
|
||||
|
||||
Reference in New Issue
Block a user