Linux and Mac File and Directory Permissions Modification
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which acti...
BY SOURCE
PROCEDURES (13)
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for unusual
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for command line monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for authentication monitoring
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for container