exein-io / pulsar

A modular and blazing fast runtime security tool for the IoT, powered by eBPF.
https://pulsar.sh
Other
888 stars 51 forks source link

new (`rules-engine`): add new metadata fields to rules #265

Closed hdtrinh closed 4 months ago

hdtrinh commented 6 months ago

Add new metadata fields to rules

This PR implements the parsing of new metadata to enrich security rules. Currently, we would like to add these new fields:

The rule syntax will be as follows:

- name: Unshadow execution start
  type: Exec
  condition: header.image ENDS_WITH "/unshadow" AND payload.argc >= 2
  category: credential_access
  severity: medium
  description: Identifies the execution of the unshadow utility which is part of John the Ripper,
    a password-cracking tool on the host machine. Malicious actors can use the utility to retrieve
    the combined contents of the '/etc/shadow' and '/etc/password' files.
    Using the combined file generated from the utility, the malicious threat actors can use them as input
    for password-cracking utilities or prepare themselves for future operations by gathering credential information of the victim.

Valid severity values are low, medium, high, and critical.

Valid category values are from the MITRE ATT&CK framework:

I have