Loading

Linux Restricted Shell Breakout via awk Commands

Warning

This rule has been deprecated as of 2022/05/09.

Identifies Linux binary awk abuse to breakout out of restricted shells or environments by spawning an interactive system shell. The awk utility is a text processing language used for data extraction and reporting tools and the activity of spawning shell is not a standard use of this binary for a user or system administrator. It indicates a potentially malicious actor attempting to improve the capabilities or stability of their access.

Rule type: eql
Rule indices:

  • logs-endpoint.events.*

Rule Severity: medium
Risk Score: 47
Runs every:
Searches indices from: now-9m
Maximum alerts per execution: 100
References:

Tags:

  • Elastic
  • Host
  • Linux
  • Threat Detection
  • Execution
  • GTFOBins

Version: 100
Rule authors:

  • Elastic

Rule license: Elastic License v2

process where event.type == "start" and process.name in ("sh", "bash", "dash") and
  process.parent.name in ("nawk", "mawk", "awk", "gawk") and process.parent.args : "BEGIN {system(*)}"
		

Framework: MITRE ATT&CK