Local Groups Discovery - Linux
Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings
Sigma rule (View on GitHub)
1title: Local Groups Discovery - Linux
2id: 676381a6-15ca-4d73-a9c8-6a22e970b90d
3status: test
4description: Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.001/T1069.001.md
7author: Ömer Günal, Alejandro Ortuno, oscd.community
8date: 2020-10-11
9modified: 2022-11-27
10tags:
11 - attack.discovery
12 - attack.t1069.001
13logsource:
14 category: process_creation
15 product: linux
16detection:
17 selection_1:
18 Image|endswith: '/groups'
19 selection_2:
20 Image|endswith:
21 - '/cat'
22 - '/head'
23 - '/tail'
24 - '/more'
25 CommandLine|contains: '/etc/group'
26 condition: 1 of selection*
27falsepositives:
28 - Legitimate administration activities
29level: low
References
Related rules
- AD Groups Or Users Enumeration Using PowerShell - PoshModule
- AD Groups Or Users Enumeration Using PowerShell - ScriptBlock
- BloodHound Collection Files
- HackTool - Bloodhound/Sharphound Execution
- Local Groups Discovery - MacOs