<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.t1686 on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.t1686/</link>
    <description>Recent content in attack.t1686 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.t1686/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Bpfdoor TCP Ports Redirect</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_bpfdoor_port_redirect/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_bpfdoor_port_redirect/</guid>
      <description>
        
          
            All TCP traffic on particular port from attacker is routed to different port. ex. &#39;/sbin/iptables -t nat -D PREROUTING -p tcp -s 192.168.1.1 --dport 22 -j REDIRECT --to-ports 42392&#39;
The traffic looks like encrypted SSH communications going to TCP port 22, but in reality is being directed to the shell port once it hits the iptables rule for the attacker host only.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Disable System Firewall</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/service_stop/lnx_auditd_disable_system_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/service_stop/lnx_auditd_disable_system_firewall/</guid>
      <description>
        
          
            Detects disabling of system firewalls which could be used by adversaries to bypass controls that limit usage of the network.
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabling Security Tools</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_security_tools_disabling/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_security_tools_disabling/</guid>
      <description>
        
          
            Detects disabling security tools
          
          
        
      </description>
    </item>
    
    <item>
      <title>Disabling Security Tools - Builtin</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/builtin/syslog/lnx_syslog_security_tools_disabling_syslog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/builtin/syslog/lnx_syslog_security_tools_disabling_syslog/</guid>
      <description>
        
          
            Detects disabling security tools
          
          
        
      </description>
    </item>
    
    <item>
      <title>Flush Iptables Ufw Chain</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_iptables_flush_ufw/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_iptables_flush_ufw/</guid>
      <description>
        
          
            Detect use of iptables to flush all firewall rules, tables and chains and allow all network traffic
          
          
        
      </description>
    </item>
    
    <item>
      <title>Modify System Firewall</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_modify_system_firewall/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/execve/lnx_auditd_modify_system_firewall/</guid>
      <description>
        
          
            Detects the removal of system firewall rules. Adversaries may only delete or modify a specific system firewall rule to bypass controls limiting network usage or access.
Detection rules that match only on the disabling of firewalls will miss this.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Ufw Force Stop Using Ufw-Init</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_disable_ufw/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_disable_ufw/</guid>
      <description>
        
          
            Detects attempts to force stop the ufw using ufw-init
          
          
        
      </description>
    </item>
    
  </channel>
</rss>
