File tree 2 files changed +17
-14
lines changed
rules/linux/process_creation
2 files changed +17
-14
lines changed Original file line number Diff line number Diff line change 1
- title : Python Spawning Pretty TTY
1
+ title : Python Spawning Pretty TTY Via PTY Module
2
2
id : c4042d54-110d-45dd-a0e1-05c47822c937
3
3
related :
4
4
- id : 32e62bc7-3de0-4bb1-90af-532978fe42c0
5
5
type : similar
6
6
status : test
7
- description : Detects python spawning a pretty tty which could be indicative of potential reverse shell activity
7
+ description : |
8
+ Detects a python process calling to the PTY module in order to spawn a pretty tty which could be indicative of potential reverse shell activity.
8
9
references :
9
10
- https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/
10
11
author : Nextron Systems
11
12
date : 2022-06-03
12
- modified : 2023-06-16
13
+ modified : 2024-11-04
13
14
tags :
14
15
- attack.execution
15
16
- attack.t1059
@@ -25,13 +26,13 @@ detection:
25
26
- Image|contains :
26
27
- ' /python2.' # python image is always of the form ../python3.10; ../python is just a symlink
27
28
- ' /python3.'
28
- selection_cli_1 :
29
- CommandLine|contains|all :
29
+ selection_cli_import :
30
+ CommandLine|contains :
30
31
- ' import pty'
31
- - ' .spawn( '
32
- selection_cli_2 :
33
- CommandLine|contains : ' from pty import spawn'
34
- condition : selection_img and 1 of selection_cli_ *
32
+ - ' from pty '
33
+ selection_cli_spawn :
34
+ CommandLine|contains : ' spawn'
35
+ condition : all of selection_ *
35
36
falsepositives :
36
37
- Unknown
37
- level : high
38
+ level : medium
Original file line number Diff line number Diff line change 1
- title : Potential Python Reverse Shell
1
+ title : Python Reverse Shell Execution Via PTY And Socket Modules
2
2
id : 32e62bc7-3de0-4bb1-90af-532978fe42c0
3
3
related :
4
4
- id : c4042d54-110d-45dd-a0e1-05c47822c937
5
5
type : similar
6
6
status : test
7
- description : Detects executing python with keywords related to network activity that could indicate a potential reverse shell
7
+ description : |
8
+ Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.
8
9
references :
9
- - https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
10
10
- https://www.revshells.com/
11
11
author : ' @d4ns4n_, Nasreddine Bencherchali (Nextron Systems)'
12
12
date : 2023-04-24
13
+ modified : 2024-11-04
13
14
tags :
14
15
- attack.execution
15
16
logsource :
@@ -22,7 +23,8 @@ detection:
22
23
- ' -c '
23
24
- ' import'
24
25
- ' pty'
25
- - ' spawn('
26
+ - ' socket'
27
+ - ' spawn'
26
28
- ' .connect'
27
29
condition : selection
28
30
falsepositives :
You can’t perform that action at this time.
0 commit comments