elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.9k stars 484 forks source link

[Meta] Linux Privilege Escalation Research & Detection Engineering #2955

Closed Aegrah closed 1 year ago

Aegrah commented 1 year ago

Summary

Analyze commonly exploited linux privilege escalation vectors, research the methodology required to exploit those vectors and analyze whether we can detect these vectors, and if not, create detection rules to cover our detection gaps.

### Tasks
- [x] Identify a set of linux privilege escalation vectors that we currently have no coverage for (week 1-2)
- [x] Exploit and research these privilege escalation vectors (week 1-2)
- [x] Write DRs for these coverage gaps (week 1-2)
- [x] Get PRs merged

Goals

Resources:

https://www.rgrosec.com/post/2022-02-17-linux-privilege-escalation.html https://book.hacktricks.xyz/linux-hardening/privilege-escalation https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS https://github.com/rebootuser/LinEnum

PRs

brokensound77 commented 1 year ago

Just did a review of all pending rules 👍, great job