Linux binary(s) ftp shell evasion threat (#2007)

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
This commit is contained in:
shashank-elastic
2022-06-01 22:07:52 +05:30
committed by GitHub
parent d6e96a83d5
commit 98a85ddcee
@@ -91,6 +91,7 @@ references = [
"https://gtfobins.github.io/gtfobins/capsh/",
"https://gtfobins.github.io/gtfobins/byebug/",
"https://gtfobins.github.io/gtfobins/git/",
"https://gtfobins.github.io/gtfobins/ftp/"
]
risk_score = 47
rule_id = "52376a86-ee86-4967-97ae-1a05f55816f0"
@@ -107,7 +108,7 @@ process where event.type == "start" and
/* launching shells from unusual parents or parent+arg combos */
(process.name in ("bash", "sh", "dash","ash") and
(process.parent.name in ("byebug","git")) or
(process.parent.name in ("byebug","git","ftp")) or
/* shells specified in parent args */
/* nice rule is broken in 8.2 */