You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description: "A process used anti-debugging techniques to block a debugger. Malware use anti-debugging to stay invisible and inhibit analysis of their behavior.",
Description: "A process used anti-debugging techniques to block a debugger. Malware use anti-debugging to stay invisible and inhibit analysis of their behavior.",
Description: "The ASLR (address space layout randomization) configuration was inspected. ASLR is used by Linux to prevent memory vulnerabilities. An adversary may want to inspect and change the ASLR configuration in order to avoid detection.",
23
-
Properties: map[string]interface{}{
24
-
"Severity": 0,
25
-
"Category": "privilege-escalation",
26
-
"Technique": "Exploitation for Privilege Escalation",
Description: "The ASLR (address space layout randomization) configuration was inspected. ASLR is used by Linux to prevent memory vulnerabilities. An adversary may want to inspect and change the ASLR configuration in order to avoid detection.",
30
+
Properties: map[string]interface{}{
31
+
"Severity": 0,
32
+
"Category": "privilege-escalation",
33
+
"Technique": "Exploitation for Privilege Escalation",
Description: "An attempt to modify Cgroup notify_on_release file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",
Description: "An attempt to modify Cgroup notify_on_release file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",
Description: "An attempt to modify Cgroup release agent file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",
Description: "An attempt to modify Cgroup release agent file was detected. Cgroups are a Linux kernel feature which limits the resource usage of a set of processes. Adversaries may use this feature for container escaping.",
Description: "Modification of the core dump configuration file (core_pattern) detected. Core dumps are usually written to disk when a program crashes. Certain modifications enable container escaping through the kernel core_pattern feature.",
Description: "Modification of the core dump configuration file (core_pattern) detected. Core dumps are usually written to disk when a program crashes. Certain modifications enable container escaping through the kernel core_pattern feature.",
Description: "The default dynamic loader has been modified. The dynamic loader is an executable file loaded to process memory and run before the executable to load dynamic libraries to the process. An attacker might use this technique to hijack the execution context of each new process and bypass defenses.",
Description: "The default dynamic loader has been modified. The dynamic loader is an executable file loaded to process memory and run before the executable to load dynamic libraries to the process. An attacker might use this technique to hijack the execution context of each new process and bypass defenses.",
Copy file name to clipboardExpand all lines: signatures/golang/disk_mount.go
+15-17Lines changed: 15 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -15,30 +15,28 @@ type DiskMount struct {
15
15
devDirstring
16
16
}
17
17
18
-
vardiskMountMetadata= detect.SignatureMetadata{
19
-
ID: "TRC-1014",
20
-
Version: "1",
21
-
Name: "Container device mount detected",
22
-
EventName: "disk_mount",
23
-
Description: "Container device filesystem mount detected. A mount of a host device filesystem can be exploited by adversaries to perform container escape.",
Description: "Container device filesystem mount detected. A mount of a host device filesystem can be exploited by adversaries to perform container escape.",
Copy file name to clipboardExpand all lines: signatures/golang/docker_abuse.go
+15-17Lines changed: 15 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -15,30 +15,28 @@ type DockerAbuse struct {
15
15
dockerSockstring
16
16
}
17
17
18
-
vardockerAbuseMetadata= detect.SignatureMetadata{
19
-
ID: "TRC-1019",
20
-
Version: "1",
21
-
Name: "Docker socket abuse detected",
22
-
EventName: "docker_abuse",
23
-
Description: "An attempt to abuse the Docker UNIX socket inside a container was detected. docker.sock is the UNIX socket that Docker uses as the entry point to the Docker API. Adversaries may attempt to abuse this socket to compromise the system.",
24
-
Properties: map[string]interface{}{
25
-
"Severity": 2,
26
-
"Category": "privilege-escalation",
27
-
"Technique": "Exploitation for Privilege Escalation",
Description: "An attempt to abuse the Docker UNIX socket inside a container was detected. docker.sock is the UNIX socket that Docker uses as the entry point to the Docker API. Adversaries may attempt to abuse this socket to compromise the system.",
31
+
Properties: map[string]interface{}{
32
+
"Severity": 2,
33
+
"Category": "privilege-escalation",
34
+
"Technique": "Exploitation for Privilege Escalation",
0 commit comments