-
Notifications
You must be signed in to change notification settings - Fork 567
[New Rule] SUID/SGUID Enumeration Detected #2956
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Attackers can leverage these permissions to escalate privileges by exploiting vulnerabilities or built-in features | ||
in the privileged program. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We could focus a bit more on the enumeration here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added an additional line to the description that talks about enumeration.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome 🧙🏼
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Co-authored-by: Justin Ibarra <[email protected]>
* [New Rule] SUID/SGUID Enumeration Detected * Remove endgame compatibility * readded endgame support after troubleshooting * Update discovery_suid_sguid_enumeration.toml * Update rules/linux/discovery_suid_sguid_enumeration.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit 03110fb)
* [New Rule] SUID/SGUID Enumeration Detected * Remove endgame compatibility * readded endgame support after troubleshooting * Update discovery_suid_sguid_enumeration.toml * Update rules/linux/discovery_suid_sguid_enumeration.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit 03110fb)
* [New Rule] SUID/SGUID Enumeration Detected * Remove endgame compatibility * readded endgame support after troubleshooting * Update discovery_suid_sguid_enumeration.toml * Update rules/linux/discovery_suid_sguid_enumeration.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit 03110fb)
* [New Rule] SUID/SGUID Enumeration Detected * Remove endgame compatibility * readded endgame support after troubleshooting * Update discovery_suid_sguid_enumeration.toml * Update rules/linux/discovery_suid_sguid_enumeration.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit 03110fb)
* [New Rule] SUID/SGUID Enumeration Detected * Remove endgame compatibility * readded endgame support after troubleshooting * Update discovery_suid_sguid_enumeration.toml * Update rules/linux/discovery_suid_sguid_enumeration.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit 03110fb)
* [New Rule] SUID/SGUID Enumeration Detected * Remove endgame compatibility * readded endgame support after troubleshooting * Update discovery_suid_sguid_enumeration.toml * Update rules/linux/discovery_suid_sguid_enumeration.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit 03110fb)
* [New Rule] SUID/SGUID Enumeration Detected * Remove endgame compatibility * readded endgame support after troubleshooting * Update discovery_suid_sguid_enumeration.toml * Update rules/linux/discovery_suid_sguid_enumeration.toml Co-authored-by: Justin Ibarra <[email protected]> --------- Co-authored-by: Justin Ibarra <[email protected]> (cherry picked from commit 03110fb)
Summary
This rule monitors for the usage of the "find" command in conjunction with SUID and SGUID permission arguments. SUID (Set User ID) and SGID (Set Group ID) are special permissions in Linux that allow a program to execute with the privileges of the file owner or group, respectively, rather than the privileges of the user running the program. Attackers can leverage these permissions to escalate privileges by exploiting vulnerabilities or built-in features in the privileged program.
Detection
The rule was tested in RedSector, and shows 0 hits in the last 365 days. However, tools such as linpeas and linenum are detected through this logic.