Linux binary(s) ftp shell evasion threat (#2007)
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
This commit is contained in:
@@ -91,6 +91,7 @@ references = [
|
||||
"https://gtfobins.github.io/gtfobins/capsh/",
|
||||
"https://gtfobins.github.io/gtfobins/byebug/",
|
||||
"https://gtfobins.github.io/gtfobins/git/",
|
||||
"https://gtfobins.github.io/gtfobins/ftp/"
|
||||
]
|
||||
risk_score = 47
|
||||
rule_id = "52376a86-ee86-4967-97ae-1a05f55816f0"
|
||||
@@ -107,7 +108,7 @@ process where event.type == "start" and
|
||||
|
||||
/* launching shells from unusual parents or parent+arg combos */
|
||||
(process.name in ("bash", "sh", "dash","ash") and
|
||||
(process.parent.name in ("byebug","git")) or
|
||||
(process.parent.name in ("byebug","git","ftp")) or
|
||||
|
||||
/* shells specified in parent args */
|
||||
/* nice rule is broken in 8.2 */
|
||||
|
||||
Reference in New Issue
Block a user