70411664cf
* normalizing hunting link generation * replacing header * adjusting quotes in f-strings * added source file to metadata * removed os dependency * address bug in source file links * reverting TOML loading * change all List type hinting to list * change all List type hinting to list * fixed accented characters in queries * reverted accent character removal; moved macos query and MD to macos folder
1.2 KiB
1.2 KiB
Privilege Escalation Identification via Existing Sudoers File
Metadata
-
Author: Elastic
-
Description: This hunt identifies entries in the sudoers file on Linux systems using OSQuery. The sudoers file controls which users have administrative privileges and can be a target for attackers seeking to escalate their privileges. This hunt lists all sudoers rules for further analysis.
-
UUID:
6e57e6a6-f150-405d-b8be-e4e666a3a86d -
Integration: endpoint
-
Language:
[SQL] -
Source File: Privilege Escalation Identification via Existing Sudoers File
Query
SELECT * FROM sudoers
Notes
- Lists all entries in the sudoers file using OSQuery to detect potentially unauthorized or suspicious rules.
- Requires additional data analysis and investigation into results to identify malicious or misconfigured sudoers entries.
- Focuses on monitoring and analyzing administrative privileges granted through the sudoers file.
MITRE ATT&CK Techniques
License
Elastic License v2