Rule Library

Sigma Rules

5 rules found for "CheraghiMilad"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowtest

Service Reload or Start - Linux

Detects the start, reload or restart of a service.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Jakob Weinzettl+2Mon Sep 23linux
Detectionhighexperimental

ASLR Disabled Via Sysctl or Direct Syscall - Linux

Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including: - Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000) - Modification of the /proc/sys/kernel/randomize_va_space file - Execution of the `sysctl` command to set `kernel.randomize_va_space=0` Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms. A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.

Linuxauditd
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsT1055.009 · Proc Memory
Milad CheraghiMon May 26linux
Detectionlowexperimental

System Info Discovery via Sysinfo Syscall

Detects use of the sysinfo system call in Linux, which provides a snapshot of key system statistics such as uptime, load averages, memory usage, and the number of running processes. Malware or reconnaissance tools might leverage sysinfo to fingerprint the system - gathering data to determine if it's a viable target.

Linuxauditd
TA0007 · DiscoveryT1057 · Process DiscoveryT1082 · System Information Discovery
Milad CheraghiFri May 30linux
Detectioninformationaltest

File and Directory Discovery - Linux

Detects usage of system utilities such as "find", "tree", "findmnt", etc, to discover files, directories and network shares.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Daniil Yugoslavskiy+2Mon Oct 19linux
Detectionlowtest

Local System Accounts Discovery - Linux

Detects enumeration of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.

LinuxProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Alejandro Ortuno+2Thu Oct 08linux