SigmaHQ/rules/linux/lnx_shell_susp_log_entries.yml

20 lines
491 B
YAML
Raw Normal View History

title: Suspicious Log Entries
2019-11-12 22:12:27 +00:00
id: f64b6e9a-5d9d-48a5-8289-e1dd2b3876e1
2020-09-14 04:03:04 +00:00
status: experimental
description: Detects suspicious log entries in Linux log files
author: Florian Roth
date: 2017/03/25
logsource:
product: linux
detection:
keywords:
2019-11-12 22:12:27 +00:00
- entered promiscuous mode
- Deactivating service
- Oversized packet received from
- imuxsock begins to drop messages
condition: keywords
falsepositives:
- Unknown
2017-05-02 18:32:38 +00:00
level: medium
2021-09-07 16:16:46 +00:00
tags:
- attack.impact