# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one # or more contributor license agreements. Licensed under the Elastic License # 2.0; you may not use this file except in compliance with the Elastic License # 2.0. from pathlib import Path from . import common from . import RtaMetadata metadata = RtaMetadata( uuid="e5a98cc9-1f15-4d14-baf2-96bebb932ae9", platforms=["linux"], endpoint=[ { "rule_name": "Potential Linux Credential Dumping via Proc Filesystem", "rule_id": "508226f9-4030-4e86-86cd-63321b7164bc", } ], siem=[ { "rule_name": "Potential Linux Credential Dumping via Proc Filesystem", "rule_id": "ef100a2e-ecd4-4f72-9d1e-2f779ff3c311" } ], techniques=["T1212", "T1003", "T1003.007"], ) @common.requires_os(*metadata.platforms) def main(): masquerade = "/tmp/ps" masquerade2 = "/tmp/strings" source = common.get_path("bin", "linux.ditto_and_spawn") common.copy_file(source, masquerade) common.copy_file(source,masquerade2) # Execute command common.log("Launching fake commands to dump credential via proc") common.execute([masquerade, "-eo", "pid", "command"], timeout=10, kill=True) common.execute([masquerade2, "/tmp/test"], timeout=10, kill=True) # cleanup common.remove_file(masquerade) common.remove_file(masquerade2) if __name__ == "__main__": exit(main())