Credentials In Files - Linux
Detecting attempts to extract passwords with grep
Sigma rule (View on GitHub)
1title: Credentials In Files - Linux
2id: df3fcaea-2715-4214-99c5-0056ea59eb35
3status: test
4description: 'Detecting attempts to extract passwords with grep'
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
7author: 'Igor Fits, oscd.community'
8date: 2020-10-15
9modified: 2023-04-30
10tags:
11 - attack.credential-access
12 - attack.t1552.001
13logsource:
14 product: linux
15 service: auditd
16detection:
17 selection:
18 type: 'EXECVE'
19 keywords:
20 '|all':
21 - 'grep'
22 - 'password'
23 condition: selection and keywords
24falsepositives:
25 - Unknown
26level: high
References
Related rules
- Active Directory Database Snapshot Via ADExplorer
- Automated Collection Command Prompt
- Azure Key Vault Modified or Deleted
- Azure Keyvault Key Modified or Deleted
- Azure Keyvault Secrets Modified or Deleted