Rule Library

Sigma Rules

11 rules found for "Blake Hartstein (Bloomberg L.P.)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Suspicious Invocation of Shell via AWK - Linux

Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

Capsh Shell Invocation - Linux

Detects the use of the "capsh" utility to invoke a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Invocation via Env Command - Linux

Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Find - Linux

Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Flock - Linux

Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution GCC - Linux

Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Git - Linux

Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Nice - Linux

Detects the use of the "nice" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Inline Python Execution - Spawn Shell Via OS System Library

Detects execution of inline Python code via the "-c" in order to call the "system" function from the "os" library, and spawn a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhighexperimental

Shell Execution via Rsync - Linux

Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+4Mon Sep 02linux
Detectionhightest

Shell Invocation Via Ssh - Linux

Detects the use of the "ssh" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Thu Aug 29linux