LoFP LoFP / t1005

t1005

TitleTags
administrators may access these files for initial setup or troubleshooting. limited in most environments. tune as needed.
administrators may use this command when troubleshooting. tune as needed.
commonly run by administrators
legitimate configuration exports may occur during normal administrative activities. these events should be verified and investigated.
legitimate configuration exports to remote locations may occur during normal administrative activities. investigate these events to verify their legitimacy and apply necessary filters.
legitimate exchange system administration activity.
legitimate pre-commit hooks or ci/cd pipeline jobs that use a script to run a credential scanner as part of a security check.
legitimate tftp server configurations may be detected by this analytic during authorized backup operations or device maintenance. network administrators sometimes use tftp for legitimate configuration backups, firmware updates, or during troubleshooting. to reduce false positives, consider implementing a baseline of expected administrative activities, including approved administrative usernames and scheduled maintenance windows.
legitimate use
no false positives have been identified at this time.
there is a potential for false positives if the reading of the service account namespace file is used for legitimate purposes, such as debugging or troubleshooting. it is important to investigate any alerts generated by this rule to determine if they are indicative of malicious activity or part of legitimate container activity.
there is a potential for false positives if the service account token or certificate is used for legitimate purposes, such as debugging or troubleshooting. it is important to investigate any alerts generated by this rule to determine if they are indicative of malicious activity or part of legitimate container activity.
trufflehog is a legitimate open-source tool used by security professionals and developers to search for sensitive information, such as passwords, api keys, and other secrets, within code repositories. it is commonly employed during security assessments and code reviews to identify potential vulnerabilities.
unknown
unlikely
vm export and ec2 image creation may be done by system administrators, devops or migration teams as part of planned maintenance, disaster-recovery or known backup methods. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. exports from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
vm exports may be done by a system or network administrator. verify whether the user identity, user agent, and/or hostname should be making changes in your environment. vm exports from unfamiliar users or hosts should be investigated. if known behavior is causing false positives, it can be exempted from the rule.