Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file modified event-processor/deploy/CS_RT_BIN_PERM_RAISE.wasm
Binary file not shown.
Binary file not shown.
Binary file not shown.
360 changes: 348 additions & 12 deletions event-processor/detector/wasm/CS_RT_BIN_PERM_RAISE/main.go

Large diffs are not rendered by default.

440 changes: 440 additions & 0 deletions event-processor/detector/wasm/CS_RT_FIFO_FILE_CREATE/main.go

Large diffs are not rendered by default.

418 changes: 418 additions & 0 deletions event-processor/detector/wasm/CS_RT_HARDLINK_CREATE/main.go

Large diffs are not rendered by default.

24 changes: 12 additions & 12 deletions runtime-monitor/pkg/model/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,8 @@ var (
//go:embed tracingpolicy/connect.yaml
connect string

//go:embed tracingpolicy/process-credentials.yaml
processCredentials string
//go:embed tracingpolicy/permissions.yaml
permissions string

//go:embed tracingpolicy/file-monitoring.yaml
fileMonitoring string
Expand All @@ -36,8 +36,8 @@ var (
//go:embed tracingpolicy/listen-socket.yaml
listenSocket string

//go:embed tracingpolicy/dup.yaml
dup string
//go:embed tracingpolicy/io-streams.yaml
ioStreams string

//go:embed tracingpolicy/io-uring.yml
ioUring string
Expand All @@ -55,10 +55,10 @@ var (
Yaml: connect,
Enabled: false,
},
"process-credentials": {
Name: "Privilege escalation",
Description: "This source tracks the commit_creds function allowing detection of privilege escalation, including superuser (root) privileges.",
Yaml: processCredentials,
"permissions": {
Name: "Actions with access permissions for files and processes",
Description: "The source tracks calls of the Linux kernel function commit_creds(), which could indicate attempts to elevate process privileges, including obtaining superuser (root) permissions. In addition, the source tracks calls of the LSM function security_path_chmod() with a set of permissions that includes execution permissions",
Yaml: permissions,
Enabled: false,
},
"file-monitoring": {
Expand Down Expand Up @@ -91,10 +91,10 @@ var (
Yaml: listenSocket,
Enabled: false,
},
"dup": {
Name: "Copying file descriptors",
Description: "This source monitors calls to functions that perform file descriptor copying. Currently, it tracks the copying of the standard input (Stdin) file descriptor, which may indicate an attempt to build a pipe required for the operation of various hacking tools.",
Yaml: dup,
"io-streams": {
Name: "Actions with standard I/O streams",
Description: "The source tracks calls of the Linux kernel function do_dup2(), which copies the standard input file descriptor (STDIN) as well as creation of a named pipe file (S_IFIFO) via the LSM function security_path_mknod(). Such actions often indicate that an attacker is attempting to start a reverse shell, a hidden communication channel, or another attack tool.",
Yaml: ioStreams,
Enabled: false,
},
"io-uring": {
Expand Down
40 changes: 0 additions & 40 deletions runtime-monitor/pkg/model/tracingpolicy/dup.yaml

This file was deleted.

Loading
Loading