Disable ASLR Via Personality Syscall - Linux
Detects the use of the personality
syscall with the ADDR_NO_RANDOMIZE flag (0x0040000),
which disables Address Space Layout Randomization (ASLR) in Linux. This is often used by attackers
exploit development, or to bypass memory protection mechanisms.
A successful use of this flag can reduce the effectiveness of ASLR and make memory corruption
attacks more reliable.
Sigma rule (View on GitHub)
1title: Disable ASLR Via Personality Syscall - Linux
2id: e497a24e-9345-4a62-9803-b06d7d7cb132
3status: experimental
4description: |
5 Detects the use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000),
6 which disables Address Space Layout Randomization (ASLR) in Linux. This is often used by attackers
7 exploit development, or to bypass memory protection mechanisms.
8 A successful use of this flag can reduce the effectiveness of ASLR and make memory corruption
9 attacks more reliable.
10references:
11 - https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/personality-syscall/README.md
12 - https://man7.org/linux/man-pages/man2/personality.2.html
13 - https://manual.cs50.io/2/personality
14author: Milad Cheraghi
15date: 2025-05-26
16modified: 2025-06-05
17tags:
18 - attack.defense-evasion
19 - attack.t1562.001
20 - attack.t1055.009
21logsource:
22 product: linux
23 service: auditd
24detection:
25 selection:
26 type: 'SYSCALL'
27 syscall: 'personality'
28 a0: 40000
29 condition: selection
30falsepositives:
31 - Debugging or legitimate software testing
32level: low
References
Related rules
- Github Secret Scanning Feature Disabled
- ESXi Syslog Configuration Change Via ESXCLI
- Suspicious Windows Service Tampering
- Hypervisor Enforced Code Integrity Disabled
- Hypervisor Enforced Paging Translation Disabled