Files
blue-team-tools/rules/linux/auditd/lnx_auditd_data_exfil_wget.yml
T
2022-03-16 14:35:19 +01:00

25 lines
816 B
YAML

title: Data Exfiltration with Wget
id: cb39d16b-b3b6-4a7a-8222-1cf24b686ffc
description: Detects attempts to post the file with the usage of wget utility. The adversary can bypass the permission restriction with the misconfigured sudo permission for wget utility which could allow them to read files like /etc/shadow.
author: 'Pawel Mazur'
status: experimental
date: 2021/11/18
references:
- https://attack.mitre.org/tactics/TA0010/
- https://linux.die.net/man/1/wget
- https://gtfobins.github.io/gtfobins/wget/
logsource:
product: linux
service: auditd
detection:
wget:
type: EXECVE
a0: wget
a1|startswith: '--post-file='
condition: wget
tags:
- attack.exfiltration
- attack.t1048.003
falsepositives:
- Legitimate usage of wget utility to post a file
level: medium