Skip to content

Commit

Permalink
Merge pull request #1 from skaynum/skaynum-patch-1
Browse files Browse the repository at this point in the history
Create Rule to detect Linux Process Code Injection
  • Loading branch information
skaynum committed Nov 25, 2023
2 parents 2c24b24 + 024315f commit c0c5d22
Showing 1 changed file with 27 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
title: Possible Linux Process Code Injection
id: 4cad6c64-d6df-42d6-8dae-eb78defdc415
status: experimental
description: This rule detects the injetion of code by overwriting the memory map of a linux process using the linux command dd.
references:
- https://www.aon.com/cyber-solutions/aon_cyber_labs/linux-based-inter-process-code-injection-without-ptrace2/
- https://github.com/AonCyberLabs/Cexigua/blob/master/overwrite.sh
- https://attack.mitre.org/techniques/T1055/009/
author: Joseph Kamau
date: 2023/11/25
tags:
- attack.defense_evasion
- attack.t1055.009
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/dd'
CommandLine|contains|all:
- 'of='
- '/proc/'
- '/mem'
condition: selection
falsepositives:
- Unknown
level: medium

0 comments on commit c0c5d22

Please sign in to comment.