Linux Host Intrusion Detection Playbook (CLI)
Introduction: The Need for Effective Linux Host Detection Capabilities
Table of Contents
1. Initial Compromise Detection
Query Option 1: Detect Suspicious Processes
Query Option 2: Identify Exploited Services
Query Option 3: Advanced Suspicious Command Detection
2. Persistence Mechanisms
Query Option 1: Detect Cronjob Modifications
Query Option 2: Monitor SSH Key Additions
Query Option 3: Advanced Persistence Detection via Startup Scripts
3. Privilege Escalation and Credential Theft
Query Option 1: Detect Sudo Abuse
Query Option 2: Credential Dumping Attempts
Query Option 3: Advanced Kernel Exploit Detection
4. Lateral Movement Detection
Query Option 1: Detect SSH Lateral Movement
Query Option 2: Monitor File Transfers via SCP or Rsync
Query Option 3: Advanced Detection of Exploited Protocols
5. Data Exfiltration Indicators
Query Option 1: Large Data Transfers via Network
Query Option 2: Use of Compression Tools
Query Option 3: DNS or HTTPS Exfiltration
6. Post-Incident Investigation
Query Option 1: Correlation of File Hashes
Query Option 2: Compromised User Accounts
Query Option 3: Incident Timeline Reconstruction
Conclusion
Last updated