-- Find root-run processes which link against libpcap -- -- WARNING: This check consumes an unusual amount of system memory (up to 225MB) -- -- references: -- * https://attack.mitre.org/techniques/T1205/001/ (Traffic Signaling: Port Knocking) -- -- platform: linux -- tags: persistent state process sniffer SELECT pmm.pid, p.uid, p.gid, pmm.path AS lib_path, p.path AS child_path, p.name AS child_name, p.cmdline AS child_cmd, p.cwd AS child_cwd, h.sha256 AS child_sha256, pp.path AS parent_path, pp.name AS parent_name, pp.cmdline AS parent_cmd, pp.cwd AS parent_cwd, pp.euid AS parent_euid, ph.sha256 AS parent_sha256 -- Using processes is much faster than process_memory_map FROM processes p LEFT JOIN process_memory_map pmm ON p.pid = pmm.pid LEFT JOIN hash h ON p.path = h.path LEFT JOIN processes pp ON p.parent = pp.pid LEFT JOIN hash AS ph ON pp.path = ph.path WHERE p.euid = 0 AND pmm.path LIKE '%libpcap%' AND child_path NOT LIKE '/usr/local/kolide-k2/bin/osqueryd-updates/%/osqueryd' AND child_path NOT LIKE '/nix/store/%-systemd-%/lib/systemd/systemd%' AND child_path NOT LIKE '/nix/store/%-systemd-%/bin/udevadm' AND child_path NOT LIKE '/System/Library/%' AND child_path NOT LIKE '/nix/store/%/bin/nix' AND child_path NOT IN ( '/usr/libexec/UserEventAgent', '/usr/sbin/systemstats', '/usr/bin/libvirtd', '/usr/sbin/cupsd', '/run/current-system/systemd/lib/systemd/systemd' ) AND child_cmd NOT IN ( '/nix/var/nix/profiles/default/bin/nix-daemon', '/run/current-system/systemd/lib/systemd/systemd' ) AND child_cmd NOT LIKE '/usr/bin/python3 -s%/usr/sbin/firewalld%' GROUP BY p.pid