LoFP LoFP / t1082

t1082

TitleTags
administrators debugging servers
as the script block is a blob of text. false positive may occur with scripts that contain the keyword as a reference or simply use it for detection.
certain tools or automated software may enumerate hardware information. these tools can be exempted via user name or process arguments to eliminate potential noise.
commonly used by administrators for troubleshooting
false positives are present based on automated tooling or system administrative usage. filter as needed.
false positives depend on scripts and administrative tools used in the monitored environment
false positives will be present based on many factors. tune the correlation as needed to reduce too many triggers.
it's possible for legitimate http requests to be made to urls containing the suspicious paths.
legitimate administration activities
legitimate administrative activities
legitimate administrative use
legitimate system administrator usage of these commands
legitimate user activity.
likely
normal use of hping is uncommon apart from security testing and research. use by non-security engineers is very uncommon.
security tools and device drivers may run these programs in order to enumerate kernel modules. use of these programs by ordinary users is uncommon. these can be exempted by process name or username.
some container tools or deployments may use these techniques natively to determine how they proceed with execution, and will need to be filtered
some of these processes may be used legitimately on web servers during maintenance or other administrative tasks.
system informer is regularly used legitimately by system administrators or developers. apply additional filters accordingly
this search is highly specific for vulnerable versions of splunk add-on builder. there are no known false positives.
uncommon user command activity can be due to an engineer logging onto a server instance in order to perform manual troubleshooting or reconfiguration.
unlikely