Files
sigma-rules/hunting/linux/docs/privilege_escalation_via_existing_sudoers.md
T

34 lines
1.2 KiB
Markdown
Raw Normal View History

# Privilege Escalation Identification via Existing Sudoers File
---
## Metadata
- **Author:** Elastic
- **Description:** This hunt identifies entries in the sudoers file on Linux systems using OSQuery. The sudoers file controls which users have administrative privileges and can be a target for attackers seeking to escalate their privileges. This hunt lists all sudoers rules for further analysis.
- **UUID:** `6e57e6a6-f150-405d-b8be-e4e666a3a86d`
- **Integration:** [endpoint](https://docs.elastic.co/integrations/endpoint)
- **Language:** `[SQL]`
- **Source File:** [Privilege Escalation Identification via Existing Sudoers File](../queries/privilege_escalation_via_existing_sudoers.toml)
## Query
```sql
SELECT * FROM sudoers
```
## Notes
- Lists all entries in the sudoers file using OSQuery to detect potentially unauthorized or suspicious rules.
- Requires additional data analysis and investigation into results to identify malicious or misconfigured sudoers entries.
- Focuses on monitoring and analyzing administrative privileges granted through the sudoers file.
## MITRE ATT&CK Techniques
- [T1548.003](https://attack.mitre.org/techniques/T1548/003)
## License
- `Elastic License v2`