Files
blue-team-tools/rules/linux/process_creation/proc_creation_lnx_hack_tools.yml
T
Nasreddine Bencherchali 7d2b70cb91 feat: add bpf related rules
2023-01-25 01:14:49 +01:00

39 lines
980 B
YAML

title: Linux HackTool Execution
id: a015e032-146d-4717-8944-7a1884122111
status: experimental
description: Detects known hacktool execution based on image name
references:
- Internal Research
- https://github.com/Gui774ume/ebpfkit
- https://github.com/pathtofile/bad-bpf
author: Nasreddine Bencherchali
date: 2023/01/03
modified: 2023/01/25
tags:
- attack.execution
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
# Add more as you see fit
- '/sqlmap'
- '/teamserver'
- '/aircrack-ng'
- '/john'
- '/setoolkit'
- '/wpscan'
- '/hydra'
- '/nikto'
# eBPF related malicious tools/poc's
- '/ebpfkit'
- '/bpfdos'
- '/exechijack'
- '/pidhide'
- '/writeblocker'
condition: selection
falsepositives:
- Unlikely
level: high