SigmaHQ/rules/linux/lnx_symlink_etc_passwd.yml
2021-05-05 11:55:49 +02:00

20 lines
507 B
YAML

title: Symlink Etc Passwd
id: c67fc22a-0be5-4b4f-aad5-2b32c4b69523
status: experimental
description: Detects suspicious command lines that look as if they would create symbolic links from or to /etc/passwd
author: Florian Roth
date: 2019/04/05
references:
- https://www.qualys.com/2021/05/04/21nails/21nails.txt
logsource:
product: linux
detection:
keywords|contains|all:
- 'ln '
- ' -s '
- '/etc/passwd'
condition: keywords
falsepositives:
- Unknown
level: high