Skip to content

<<< Hide Navigation Hide TOC >>>

Shell Execution via Find - Linux (6adfbf8f-52be-4444-9bac-81b539624146)

Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.

Galaxy ColorsAttack Pat...Sigma-Rule...
Rows: 1
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
File and Directory Discovery - T1083 (7bc57495-ea59-4380-be31-a64af124ef18) Attack Pattern Shell Execution via Find - Linux (6adfbf8f-52be-4444-9bac-81b539624146) Sigma-Rules 1