EXPLORE
← Back to Explore
T1548.001

Setuid and Setgid

An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user’s context. On Linux or macOS, when the setuid or setgid bits are set for an application binary, the application will run with the privileges of the owning user or group respectively.(Citation: setuid man page) Normally an application is run in the current user’s context, regardless of which user or group owns the application....

LinuxmacOS
21
Detections
3
Sources
0
Threat Actors

BY SOURCE

15elastic5splunk_escu1sigma

PROCEDURES (9)

General Monitoring9 detections

Auto-extracted: 9 detections for general monitoring

Persist3 detections

Auto-extracted: 3 detections for persist

Process Creation Monitoring2 detections

Auto-extracted: 2 detections for process creation monitoring

Authentication Monitoring2 detections

Auto-extracted: 2 detections for authentication monitoring

Container1 detections

Auto-extracted: 1 detections for container

Container1 detections

Auto-extracted: 1 detections for container

Persist1 detections

Auto-extracted: 1 detections for persist

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Persist1 detections

Auto-extracted: 1 detections for persist

DETECTIONS (21)