Detectionmediumexperimental

Kubernetes Potential Enumeration Activity

Detects potential Kubernetes enumeration or attack activity via the audit log. This includes the execution of common shells, utilities, or specialized tools like 'Rakkess' (access_matrix) and 'TruffleHog' via Kubernetes API requests. Attackers use these methods to perform reconnaissance (enumeration), secret harvesting, or execute code (exec) within a cluster.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
uniqu3-us3rCreated Tue Apr 28597a7e84-187d-458b-9e4f-2f5a0e676711application
Log Source
Kubernetesaudit
ProductKubernetes← raw: kubernetes
Serviceaudit← raw: audit
Detection Logic
Detection Logic3 selectors
detection:
    selection_status:
        responseStatus.code: 'ALLOW'
    selection_request_uri:
        requestURI|contains:
            # Shells Encoded
            - '%2fbin%2fash'
            - '%2fbin%2fbash'
            - '%2fbin%2fbusybox'
            - '%2fbin%2fdash'
            - '%2fbin%2fsh'
            - '%2fbin%2fzsh'
            # Shells Plain
            - '/bin/ash'
            - '/bin/bash'
            - '/bin/busybox'
            - '/bin/dash'
            - '/bin/sh'
            - '/bin/zsh'
            # Tools Encoded
            - '%2fusr%2fbin%2fcurl'
            - '%2fusr%2fbin%2fkubectl'
            - '%2fusr%2fbin%2fperl'
            - '%2fusr%2fbin%2fpython'
            - '%2fusr%2fbin%2fwget'
            # Tools Plain
            - '/usr/bin/curl'
            - '/usr/bin/kubectl'
            - '/usr/bin/perl'
            - '/usr/bin/python'
            - '/usr/bin/wget'
    selection_request_user_agent:
        userAgent|contains:
            - 'access_matrix'  # Rakkess
            - 'trufflehog'     # Secret scanning tool
            - 'azurehound'     # Azure/Cloud discovery
            - 'micro-scanner'  # Vulnerability scanning
    condition: selection_status and 1 of selection_request_*
False Positives

Authorized administrative maintenance via kubectl

Automated internal infrastructure monitoring and certificate rotation

Security-approved vulnerability or secret scanning in DevSecOps pipelines

Rule Metadata
Rule ID
597a7e84-187d-458b-9e4f-2f5a0e676711
Status
experimental
Level
medium
Type
Detection
Created
Tue Apr 28
Path
rules/application/kubernetes/audit/kubernetes_audit_potential_enumeration_activity.yml
Raw Tags
attack.executionattack.discoveryattack.t1609attack.t1613
View on GitHub