Linux HackTool Execution

Detects known hacktool execution based on image name.

Sigma rule (View on GitHub)

 1title: Linux HackTool Execution
 2id: a015e032-146d-4717-8944-7a1884122111
 3status: test
 4description: Detects known hacktool execution based on image name.
 5references:
 6    - https://github.com/Gui774ume/ebpfkit
 7    - https://github.com/pathtofile/bad-bpf
 8    - https://github.com/carlospolop/PEASS-ng
 9    - https://github.com/t3l3machus/hoaxshell
10    - https://github.com/t3l3machus/Villain
11    - https://github.com/HavocFramework/Havoc
12    - https://github.com/1N3/Sn1per
13    - https://github.com/Ne0nd0g/merlin
14    - https://github.com/Pennyw0rth/NetExec/
15author: Nasreddine Bencherchali (Nextron Systems), Georg Lauenstein (sure[secure])
16date: 2023-01-03
17modified: 2024-09-19
18tags:
19    - attack.execution
20    - attack.resource-development
21    - attack.t1587
22logsource:
23    product: linux
24    category: process_creation
25detection:
26    selection_c2_frameworks:
27        Image|endswith:
28            - '/crackmapexec'
29            - '/havoc'
30            - '/merlin-agent'
31            - '/merlinServer-Linux-x64'
32            - '/msfconsole'
33            - '/msfvenom'
34            - '/ps-empire server'
35            - '/ps-empire'
36            - '/sliver-client'
37            - '/sliver-server'
38            - '/Villain.py'
39    selection_c2_framework_cobaltstrike:
40        Image|contains:
41            - '/cobaltstrike'
42            - '/teamserver'
43    selection_scanners:
44        Image|endswith:
45            - '/autorecon'
46            - '/httpx'
47            - '/legion'
48            - '/naabu'
49            - '/netdiscover'
50            - '/nuclei'
51            - '/recon-ng'
52    selection_scanners_sniper:
53        Image|contains: '/sniper'
54    selection_web_enum:
55        Image|endswith:
56            - '/dirb'
57            - '/dirbuster'
58            - '/eyewitness'
59            - '/feroxbuster'
60            - '/ffuf'
61            - '/gobuster'
62            - '/wfuzz'
63            - '/whatweb'
64    selection_web_vuln:
65        Image|endswith:
66            - '/joomscan'
67            - '/nikto'
68            - '/wpscan'
69    selection_exploit_tools:
70        Image|endswith:
71            - '/aircrack-ng'
72            - '/bloodhound-python'
73            - '/bpfdos'
74            - '/ebpfki'
75            - '/evil-winrm'
76            - '/hashcat'
77            - '/hoaxshell.py'
78            - '/hydra'
79            - '/john'
80            - '/ncrack'
81            # default binary: https://github.com/Pennyw0rth/NetExec/releases/download/v1.0.0/nxc-ubuntu-latest
82            - '/nxc-ubuntu-latest'
83            - '/pidhide'
84            - '/pspy32'
85            - '/pspy32s'
86            - '/pspy64'
87            - '/pspy64s'
88            - '/setoolkit'
89            - '/sqlmap'
90            - '/writeblocker'
91    selection_linpeas:
92        # covers: all linux versions listed here: https://github.com/carlospolop/PEASS-ng/releases
93        Image|contains: '/linpeas'
94    condition: 1 of selection_*
95falsepositives:
96    - Unlikely
97level: high

References

Related rules

to-top