Unexpected Pcap User Linux
osquery
Find root-run processes which link against libpcap
Description
ODK (osquery-defense-kit) is unique in that the queries are designed to be used as part of a production detection & response pipeline. The detection queries are formulated to return zero rows during normal expected behavior, so that they may be configured to generate alerts when rows are returned.
Query
-- Find root-run processes which link against libpcap
--
-- WARNING: This check consumes an unusual amount of system memory (up to 225MB)
--
-- references:
-- * https://attack.mitre.org/techniques/T1205/001/ (Traffic Signaling: Port Knocking)
--
-- platform: linux
-- tags: persistent state process sniffer
SELECT
pmm.pid,uid,
p.
p.gid,AS lib_path,
pmm.path AS child_path,
p.path AS child_name,
p.name AS child_cmd,
p.cmdline AS child_cwd,
p.cwd AS child_sha256,
h.sha256 AS parent_path,
pp.path AS parent_name,
pp.name AS parent_cmd,
pp.cmdline AS parent_cwd,
pp.cwd AS parent_euid,
pp.euid AS parent_sha256
ph.sha256 -- Using processes is much faster than process_memory_map
FROM
processes pLEFT JOIN process_memory_map pmm ON p.pid = pmm.pid
LEFT JOIN hash h ON p.path = h.path
LEFT JOIN processes pp ON p.parent = pp.pid
LEFT JOIN hash AS ph ON pp.path = ph.path
WHERE
= 0
p.euid AND pmm.path LIKE '%libpcap%'
AND child_path NOT LIKE '/nix/store/%-systemd-%/bin/udevadm'
AND child_path NOT LIKE '/nix/store/%-systemd-%/lib/systemd/systemd%'
AND child_path NOT LIKE '/nix/store/%/bin/nix'
AND child_path NOT LIKE '/System/Library/%'
AND child_path NOT LIKE '/usr/local/kolide-k2/bin/osqueryd-updates/%/osqueryd'
AND child_path NOT IN (
'/run/current-system/systemd/lib/systemd/systemd',
'/usr/bin/libvirtd',
'/usr/bin/tcpdump',
'/usr/libexec/UserEventAgent',
'/usr/sbin/cupsd',
'/usr/sbin/systemstats'
)AND child_cmd NOT IN (
'/nix/var/nix/profiles/default/bin/nix-daemon',
'/run/current-system/systemd/lib/systemd/systemd'
)AND child_cmd NOT LIKE '/usr/bin/python3 -s%/usr/sbin/firewalld%'
GROUP BY
p.pid
tags: SStagSS