﻿---
title: Linux Restricted Shell Breakout via c89/c99 Shell evasion
description: Identifies Linux binary c89/c99 abuse to break out from restricted environments by spawning an interactive system shell.The c89/c99 utility is an interface...
url: https://www.elastic.co/elastic/docs-builder/docs/3167/reference/security/prebuilt-rules/rules/_deprecated/execution_c89_c99_binary
products:
  - Elastic Security
---

# Linux Restricted Shell Breakout via c89/c99 Shell evasion
<warning>
  This rule has been deprecated as of 2022/05/09.
</warning>

Identifies Linux binary c89/c99 abuse to break out from restricted environments by spawning an interactive system
shell.The c89/c99 utility is an interface to the standard C compilation system and the activity of spawing a shell is
not a standard use of this binary by a user or system administrator. It indicates a potentially malicious actor
attempting to improve the capabilities or stability of their access.
**Rule type**: eql
**Rule indices**:
- logs-endpoint.events.*

**Rule Severity**: medium
**Risk Score**: 47
**Runs every**: 
**Searches indices from**: `now-9m`
**Maximum alerts per execution**: 100
**References**:
- [[https://gtfobins.github.io/gtfobins/c89/](https://gtfobins.github.io/gtfobins/c89/)](https://gtfobins.github.io/gtfobins/c89/)
- [[https://gtfobins.github.io/gtfobins/c99/](https://gtfobins.github.io/gtfobins/c99/)](https://gtfobins.github.io/gtfobins/c99/)

**Tags**:
- Elastic
- Host
- Linux
- Threat Detection
- Execution
- GTFOBins

**Version**: 100
**Rule authors**:
- Elastic

**Rule license**: Elastic License v2

## Rule Query

```eql
process where event.type == "start" and process.name in ("sh", "dash", "bash") and
  process.parent.name in ("c89","c99") and process.parent.args == "-wrapper" and
  process.parent.args in ("sh,-s", "bash,-s", "dash,-s", "/bin/sh,-s", "/bin/bash,-s", "/bin/dash,-s")
```

**Framework:** MITRE ATT&CK
- Tactic:
  - Name: Execution
- Id: TA0002
- Reference URL: [[https://attack.mitre.org/tactics/TA0002/](https://attack.mitre.org/tactics/TA0002/)](https://attack.mitre.org/tactics/TA0002/)
- Technique:
  - Name: Command and Scripting Interpreter
- Id: T1059
- Reference URL: [[https://attack.mitre.org/techniques/T1059/](https://attack.mitre.org/techniques/T1059/)](https://attack.mitre.org/techniques/T1059/)
- Sub Technique:
  - Name: Unix Shell
- Id: T1059.004
- Reference URL: [[https://attack.mitre.org/techniques/T1059/004/](https://attack.mitre.org/techniques/T1059/004/)](https://attack.mitre.org/techniques/T1059/004/)