Title : Equation Group Indicators
Rule id : 41e5c73d-9983-4b69-bd03-e13b67e9623c
Url | |
---|---|
https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1 | pdf/fbc23cf7bdb7d8008b1bfee9a092047593ddb804ccd640576a72fd3289725226.pdf |
Title : Audio Capture
Rule id : a7af2487-9c2f-42e4-9bb9-ff961f0561d5
Title : Auditing Configuration Changes on Linux Host
Rule id : 977ef627-4539-4875-adf4-ed8f780c4922
Url | |
---|---|
https://github.com/Neo23x0/auditd/blob/master/audit.rules | pdf/d6593fa1148ff6aed550d6fc70d6949e591c28948e6f95571384a21363675f5a.pdf |
Title : Binary Padding - Linux
Rule id : c52a914f-3d8b-4b2a-bb75-b3991e75f8ba
Title : BPFDoor Abnormal Process ID or Lock File Accessed
Rule id : 808146b2-9332-4d78-9416-d7e47012d83d
Title : Bpfdoor TCP Ports Redirect
Rule id : 70b4156e-50fc-4523-aa50-c9dddf1993fc
Title : Linux Capabilities Discovery
Rule id : fe10751f-1995-40a5-aaa2-c97ccb4123fe
Title : File Time Attribute Change - Linux
Rule id : b3cec4e7-6901-4b0d-a02d-8ab2d8eb818b
Title : Remove Immutable File Attribute - Auditd
Rule id : a5b977d6-8a81-4475-91b9-49dbfcd941f7
Title : Clipboard Collection with Xclip Tool - Auditd
Rule id : 214e7e6c-f21b-47ff-bb6f-551b2d143fcf
Title : Clipboard Collection of Image Data with Xclip Tool
Rule id : f200dc3f-b219-425d-a17e-c38467364816
Url | |
---|---|
https://linux.die.net/man/1/xclip | pdf/23be3ac537b25fcde2767b6df6a41027c24f3a49b1aa170447d5cc66a0e1e672.pdf |
Title : Possible Coin Miner CPU Priority Param
Rule id : 071d5e5a-9cef-47ec-bc4e-a42e34d8d0ed
Url | |
---|---|
https://xmrig.com/docs/miner/command-line-options | pdf/d3c9b29a4189c35d246a2bc7341789d20040d86743d980f6bcc2d27d34e1321c.pdf |
Title : Creation Of An User Account
Rule id : 759d0d51-bc99-4b5e-9add-8f5b2c8e7512
Title : Data Compressed
Rule id : a3b5e3e9-1b49-4119-8b8e-0344a01f21ee
Title : Data Exfiltration with Wget
Rule id : cb39d16b-b3b6-4a7a-8222-1cf24b686ffc
Title : Overwriting the File with Dev Zero or Null
Rule id : 37222991-11e9-4b6d-8bdf-60fbe48f753e
Url | |
---|---|
https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1485/T1485.md | pdf/30ba54dacc6c710e5d0139037ac2dc6e616374e17b0318b650d46f0f1365d780.pdf |
Title : Disable System Firewall
Rule id : 53059bc0-1472-438b-956a-7508a94a91f0
Title : File or Folder Permissions Change
Rule id : 74c01ace-0152-4094-8ae2-6fd776dd43e5
Title : Credentials In Files - Linux
Rule id : df3fcaea-2715-4214-99c5-0056ea59eb35
lnx_auditd_hidden_binary_execution
Title : Use Of Hidden Paths Or Files
Rule id : 9e1bef8d-0fff-46f6-8465-9aa54e128c1e
lnx_auditd_hidden_files_directories
Title : Hidden Files and Directories
Rule id : d08722cd-3d09-449a-80b4-83ea2d9d4616
lnx_auditd_hidden_zip_files_steganography
Title : Steganography Hide Zip Information in Picture File
Rule id : 45810b50-7edc-42ca-813b-bdac02fb946b
Url | |
---|---|
https://zerotoroot.me/steganography-hiding-a-zip-in-a-jpeg-file/ | pdf/ebd6f5e3db9d03134c97362882acefa982e449fc03ec40d2d177096dd3541201.pdf |
Title : Linux Keylogging with Pam.d
Rule id : 49aae26c-450e-448b-911d-b3c13d178dfc
Title : Modification of ld.so.preload
Rule id : 4b3cb710-5e83-4715-8c45-8b2b5b3e5751
Title : Loading of Kernel Module via Insmod
Rule id : 106d7cbd-80ff-4985-b682-a7043e5acb72
Title : Logging Configuration Changes on Linux Host
Rule id : c830f15d-6f6e-430f-8074-6f73d6807841
Url |
---|
Title : Masquerading as Linux Crond Process
Rule id : 9d4548fa-bba0-4e88-bd66-5d5bf516cda0
Title : Modify System Firewall
Rule id : 323ff3f5-0013-4847-bbd4-250b5edb62cc
Title : Linux Network Service Scanning - Auditd
Rule id : 3761e026-f259-44e6-8826-719ed8079408
Url | |
---|---|
https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md | pdf/0e300490f9b9e519900fb52a9a7c25b4cfbda5229df3ed3f93a968fd752cc2d4.pdf |
Title : Network Sniffing - Linux
Rule id : f4d3748a-65d1-4806-bd23-e25728081d01
Url | |
---|---|
https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1040/T1040.md | pdf/d7c15ee67fa9d7580361e733b0e154bffbd6957e43ca231e534a24b98c5c5daf.pdf |
Title : Password Policy Discovery
Rule id : ca94a6db-8106-4737-9ed2-3e3bb826af0a
Title : Systemd Service Reload or Start
Rule id : 2625cc59-0634-40d0-821e-cb67382a3dd7
Title : Screen Capture with Import Tool
Rule id : dbe4b9c5-c254-4258-9688-d6af0b7967fd
Title : Screen Capture with Xwd
Rule id : e2f17c5d-b02a-442b-9052-6eb89c9fec9c
Title : Split A File Into Pieces - Linux
Rule id : 2dad0cba-c62a-4a4f-949f-5f6ecd619769
Url | |
---|---|
https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1030/T1030.md | pdf/df1251e080b6409bae9e3adec03ae86734d2e7a792b309943c6505c79cc59f2e.pdf |
Title : Steganography Hide Files with Steghide
Rule id : ce446a9e-30b9-4483-8e38-d2c9ad0a2280
Url | |
---|---|
https://vitux.com/how-to-hide-confidential-files-in-images-on-debian-using-steganography/ | pdf/966769b10a3ab68fadd1aa80e34bcb0225358b04eb3c5c21b1c78397a6e91647.pdf |
Title : Steganography Extract Files with Steghide
Rule id : a5a827d9-1bbe-4952-9293-c59d897eb41b
Url | |
---|---|
https://vitux.com/how-to-hide-confidential-files-in-images-on-debian-using-steganography/ | pdf/966769b10a3ab68fadd1aa80e34bcb0225358b04eb3c5c21b1c78397a6e91647.pdf |
Title : Suspicious C2 Activities
Rule id : f7158a64-6204-4d6d-868a-6e6378b467e0
Url | |
---|---|
https://github.com/Neo23x0/auditd | pdf/f5c1907c75d7afa927a6df6becee7d453d9237f8d2e5c642750fa818f56270be.pdf |
Title : Suspicious Commands Linux
Rule id : 1543ae20-cbdf-4ec1-8d12-7664d667a825
Url |
---|
Title : Program Executions in Suspicious Folders
Rule id : a39d7fa7-3fbd-4dc2-97e1-d87f546b1bbc
Url |
---|
Title : Suspicious History File Operations - Linux
Rule id : eae8ce9f-bde9-47a6-8e79-f20d18419910
Title : System Information Discovery - Auditd
Rule id : f34047d9-20d3-4e8b-8672-0a35cc50dc71
Url | |
---|---|
https://github.com/redcanaryco/atomic-red-team/blob/f296668303c29d3f4c07e42bdd2b28d8dd6625f9/atomics/T1082/T1082.md | pdf/de03ff30bbf8bd4d33d32d51baf6ba7f056a6790112680e0c65dffca386cdb2e.pdf |
Title : System and Hardware Information Discovery
Rule id : 1f358e2e-cb63-43c3-b575-dfb072a6814f
Title : System Shutdown/Reboot - Linux
Rule id : 4cb57c2f-1f29-41f8-893d-8bed8e1c1d2f
Url | |
---|---|
https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1529/T1529.md | pdf/98fa7e30ea06cd75aef7b63534dffb0afea17fbc26d4693250c93052ebec7fc4.pdf |
Title : Systemd Service Creation
Rule id : 1bac86ba-41aa-4f62-9d6b-405eac99b485
Title : Unix Shell Configuration Modification
Rule id : a94cdd87-6c54-4678-a6cc-2814ffe5a13d
lnx_auditd_unzip_hidden_zip_files_steganography
Title : Steganography Unzip Hidden Information From Picture File
Rule id : edd595d7-7895-4fa7-acb3-85a18a8772ca
Url | |
---|---|
https://zerotoroot.me/steganography-hiding-a-zip-in-a-jpeg-file/ | pdf/ebd6f5e3db9d03134c97362882acefa982e449fc03ec40d2d177096dd3541201.pdf |
Title : System Owner or User Discovery
Rule id : 9a0d8ca0-2385-4020-b6c6-cb6153ca56f3
Url | |
---|---|
https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1033/T1033.md | pdf/b309f0ce7f7a95fc90176adbed4fda9687f1f478eb5970ca4777207036ff9eea.pdf |
Title : Webshell Remote Command Execution
Rule id : c0d3734d-330f-4a03-aae2-65dacc6a8222
Url |
---|
Title : PwnKit Local Privilege Escalation
Rule id : 0506a799-698b-43b4-85a1-ac4c84c720e9
Url | |
---|---|
https://twitter.com/wdormann/status/1486161836961579020 | pdf/9af4fc08c3571dc59315bb5468bbaf9f2cfab3f3357c1e876ec09e21707992b9.pdf |
Title : Buffer Overflow Attempts
Rule id : 18b042f0-2ecd-4b6e-9f8d-aa7a7e7de781
Url | |
---|---|
https://github.com/ossec/ossec-hids/blob/1ecffb1b884607cb12e619f9ab3c04f530801083/etc/rules/attack_rules.xml | pdf/9325232d6354399b7c2f7dd5f8cbcb2069a61c78212612c9558cba27fd0328e3.pdf |
Title : Relevant ClamAV Message
Rule id : 36aa86ca-fd9d-4456-814e-d3b1b8e1e0bb
Url | |
---|---|
https://github.com/ossec/ossec-hids/blob/1ecffb1b884607cb12e619f9ab3c04f530801083/etc/rules/clam_av_rules.xml | pdf/4fb4c04620ce47f9a6adc26b7ccd0e7b42a72d046f6bf3368a2c2610dc11e9f0.pdf |
Title : Commands to Clear or Remove the Syslog - Builtin
Rule id : e09eb557-96d2-4de9-ba2d-30f712a5afd3
Url | |
---|---|
https://www.virustotal.com/gui/file/fc614fb4bda24ae8ca2c44e812d12c0fab6dd7a097472a35dd12ded053ab8474 | pdf/2ce1f45fc21dbe58f76244cf6f1fd4ac0f3741899270fee2bc67f5afa017bf92.pdf |
Title : Modifying Crontab
Rule id : af202fd3-7bff-4212-a25a-fb34606cfcbe
Title : Remote File Copy
Rule id : 7a14080d-a048-4de8-ae58-604ce58a795b
Url | |
---|---|
https://attack.mitre.org/techniques/T1105/ | pdf/222c98238fe419c0318c9110e552407434be067baaf7a6b6bad5b30bfff15bee.pdf |
Title : Guacamole Two Users Sharing Session Anomaly
Rule id : 1edd77db-0669-4fef-9598-165bda82826d
Url | |
---|---|
https://research.checkpoint.com/2020/apache-guacamole-rce/ | pdf/4c50178ddf1fe3675c1aef339ad56620430a9aaf4299e29f850aedb8057329b6.pdf |
Title : Code Injection by ld.so Preload
Rule id : 7e3c4651-c347-40c4-b1d4-d48590fdf684
Url | |
---|---|
https://man7.org/linux/man-pages/man8/ld.so.8.html | pdf/646c1683964273954a58a088137a8c7a5b4ca652b488d8527c6e002acdfbbd54.pdf |
Title : Nimbuspwn Exploitation
Rule id : 7ba05b43-adad-4c02-b5e9-c8c35cdf9fa8
Title : Potential Suspicious BPF Activity - Linux
Rule id : 0fadd880-6af3-4610-b1e5-008dc3a11b8a
Title : Privileged User Has Been Created
Rule id : 0ac15ec3-d24f-4246-aa2a-3077bb1cf90e
Title : Linux Command History Tampering
Rule id : fdc88d25-96fb-4b7c-9633-c0e417fdbd4e
Title : Suspicious Activity in Shell Commands
Rule id : 2aa1440c-9ae9-4d92-84a7-a9e5f5e31695
Title : Suspicious Log Entries
Rule id : f64b6e9a-5d9d-48a5-8289-e1dd2b3876e1
Url | |
---|---|
https://github.com/ossec/ossec-hids/blob/master/etc/rules/syslog_rules.xml | pdf/dbc9075ad22adc01a46b41e5b9c6c72c3933a0a38b8a3757400a80c9f1873057.pdf |
Title : Suspicious Reverse Shell Command Line
Rule id : 738d9bcf-6999-4fdb-b4ac-3033037db8ab
Url | |
---|---|
https://alamot.github.io/reverse_shells/ | pdf/f7626de58c8694b5e22f444f8d2b076bbb7f4042218723f3e935c8fd85148afa.pdf |
Title : Shellshock Expression
Rule id : c67e0c98-4d39-46ee-8f6b-437ebf6b950e
Url |
---|
Title : Space After Filename
Rule id : 879c3015-c88b-4782-93d7-07adf92dbcb7
Url | |
---|---|
https://attack.mitre.org/techniques/T1064 | pdf/d5e3cdd408876aabc2c224dcabd433cf9e1bc461112130e802c01356a35a83a8.pdf |
Title : Potential CVE-2023-2283 Exploitation
Rule id : 8b244735-5833-4517-a45b-28d8c63924c0
Title : SSHD Error Message CVE-2018-15473
Rule id : 4c9d903d-4939-4094-ade0-3cb748f4d7da
Url | |
---|---|
https://github.com/Rhynorater/CVE-2018-15473-Exploit | pdf/424daa7508c2c52e5514e32ab3e395e0eb087dabbcda8ff1285c115292641e35.pdf |
Title : Suspicious OpenSSH Daemon Error
Rule id : e76b413a-83d0-4b94-8e4c-85db4a5b8bdc
Title : Sudo Privilege Escalation CVE-2019-14287 - Builtin
Rule id : 7fcc54cb-f27d-4684-84b7-436af096f858
Title : Suspicious Use of /dev/tcp
Rule id : 6cc5fceb-9a71-4c23-aeeb-963abe0b279c
Title : JexBoss Command Sequence
Rule id : 8ec2c8b4-557a-4121-b87c-5dfb3a602fae
Url | |
---|---|
https://www.us-cert.gov/ncas/analysis-reports/AR18-312A | pdf/0e5b3b0ba446db91a2f950ff326631254c072aa3c9cd7818de58bade53bd727d.pdf |
Title : Symlink Etc Passwd
Rule id : c67fc22a-0be5-4b4f-aad5-2b32c4b69523
Url | |
---|---|
https://www.qualys.com/2021/05/04/21nails/21nails.txt | pdf/4b68ec2aee571fece036aab06e40a422625e844b7fe32e39d325c04f87fbb0f7.pdf |
Title : Disabling Security Tools - Builtin
Rule id : 49f5dfc1-f92e-4d34-96fa-feba3f6acf36
Title : Suspicious Named Error
Rule id : c8e35e96-19ce-4f16-aeb6-fd5588dc5365
Url | |
---|---|
https://github.com/ossec/ossec-hids/blob/1ecffb1b884607cb12e619f9ab3c04f530801083/etc/rules/named_rules.xml | pdf/094485d628a8d0f55f03e5f15d33dcdf36fced45a6c3fa48ca5b87405d7017bc.pdf |
Title : Suspicious VSFTPD Error Messages
Rule id : 377f33a1-4b36-4ee1-acee-1dbe4b43cfbe
Url | |
---|---|
https://github.com/dagwieers/vsftpd/ | pdf/b0035cd64b62d0414d1835337ed9308463684507c6e4f3d9cb5ad20b2d5e1e2d.pdf |