Suspicious Log Entries
Detects suspicious log entries in Linux log files
Sigma rule (View on GitHub)
1title: Suspicious Log Entries
2id: f64b6e9a-5d9d-48a5-8289-e1dd2b3876e1
3status: test
4description: Detects suspicious log entries in Linux log files
5references:
6 - https://github.com/ossec/ossec-hids/blob/master/etc/rules/syslog_rules.xml
7author: Florian Roth (Nextron Systems)
8date: 2017-03-25
9modified: 2021-11-27
10tags:
11 - attack.impact
12logsource:
13 product: linux
14detection:
15 keywords:
16 # Generic suspicious log lines
17 - 'entered promiscuous mode'
18 # OSSEC https://github.com/ossec/ossec-hids/blob/master/etc/rules/syslog_rules.xml
19 - 'Deactivating service'
20 - 'Oversized packet received from'
21 - 'imuxsock begins to drop messages'
22 condition: keywords
23falsepositives:
24 - Unknown
25level: medium
References
Related rules
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- AWS EC2 Disable EBS Encryption
- AWS EFS Fileshare Modified or Deleted
- AWS EFS Fileshare Mount Modified or Deleted