Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deleting all Keys from the syscall_exit_ta Map Causes the Agent to No Longer Detect #2915

Closed
agadient opened this issue Nov 17, 2023 · 5 comments

Comments

@agadient
Copy link

Describe the bug

A privileged user that attempts to delete all keys from the syscall_exit_ta causes the agent to no longer detect future actions on the system.

How to reproduce it

Compile and run the program located here: https://github.com/Vali-Cyber/ebpf-attacks/tree/main/delete_keys

Expected behaviour

Run the delete_keys program as a privileged user with the -falco flag. Then, try to access the /etc.pam.conf file. Alerts are no longer triggered after the delete_keys program runs.

Environment

  • Falco version:

Falco version: 0.36.2 (x86_64)

  • System info:
  • Cloud provider or hardware configuration: Local VMWare VM
  • OS:

PRETTY_NAME="Ubuntu 22.04.1 LTS"
NAME="Ubuntu"
VERSION_ID="22.04"
VERSION="22.04.1 LTS (Jammy Jellyfish)"
VERSION_CODENAME=jammy
ID=ubuntu
ID_LIKE=debian
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
UBUNTU_CODENAME=jammy

Additional context

@Andreagit97
Copy link
Member

ei @agadient this is true. If you use Falco with ebpf and you have enough privileges to delete entries into a map, Falco will stop collecting syscalls. The point here is that Falco should notify you that an unprivileged user gained extra permissions so you can stop him before malevolous actions...once the system is compromised Falco's behavior can be altered of course but probably your system is already gone...

TL;DR; probably Falco should help you prevent these possible attacks, once the attacker has already gained privileges I'm not sure you can do something with Falco...

@Andreagit97 Andreagit97 added this to the TBD milestone Nov 20, 2023
@poiana
Copy link

poiana commented Feb 18, 2024

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@poiana
Copy link

poiana commented Mar 19, 2024

Stale issues rot after 30d of inactivity.

Mark the issue as fresh with /remove-lifecycle rotten.

Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle rotten

@poiana
Copy link

poiana commented Apr 18, 2024

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

@poiana poiana closed this as completed Apr 18, 2024
@poiana
Copy link

poiana commented Apr 18, 2024

@poiana: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants