b0l
04/25/2018, 6:43 PMseph
b0l
07/30/2018, 5:59 PMalessandrogario
defensivedepth
05/15/2020, 6:26 PMalessandrogario
Raff_B
10/15/2020, 10:15 AMvaar
10/18/2020, 5:41 PMzwass
clong
01/20/2021, 10:54 PMclong
01/20/2021, 10:55 PMalessandrogario
aby
02/02/2021, 10:18 PM4.4.0-142-generic
&& Ubuntu 16.04.7 LTS
p:/home/superlog# osqueryi --verbose --disable_events=false --enable_bpf_events=true --events_expiry=1
I0202 16:22:35.706341 687 init.cpp:340] osquery initialized [version=4.6.0]
I0202 16:22:35.706419 687 extensions.cpp:453] Could not autoload extensions: Cannot open file for reading: /etc/osquery/extensions.load
I0202 16:22:35.706588 687 dispatcher.cpp:78] Adding new service: ExtensionWatcher (0x564027c14d58) to thread: 139977553381120 (0x564027c151e0) in process 687
I0202 16:22:35.706670 687 dispatcher.cpp:78] Adding new service: ExtensionRunnerCore (0x564027c1bbf8) to thread: 139977544988416 (0x564027c1be40) in process 687
I0202 16:22:35.706717 687 auto_constructed_tables.cpp:97] Removing stale ATC entries
I0202 16:22:35.706832 691 interface.cpp:270] Extension manager service starting: /root/.osquery/shell.em
terminating with uncaught exception of type tob::StringError
Aborted (core dumped)
8p8c
03/03/2021, 4:02 AMI0303 03:03:34.795771 169479 bpfeventpublisher.cpp:310] Initialized BPF probe for syscall open (87)
I0303 03:03:34.800343 169479 bpfeventpublisher.cpp:310] Initialized BPF probe for syscall openat (93)
I0303 03:03:34.800472 169479 bpfeventpublisher.cpp:297] Failed to load the BPF probe for syscall openat2: Failed to open the tracepoint descriptor file: /sys/kernel/debug/tracing/events/syscalls/sys_enter_openat2/id. This syscall may not be available on this system, continuing despite the error
I0303 03:03:34.806805 169479 bpfeventpublisher.cpp:310] Initialized BPF probe for syscall socket (101)
...
I0303 03:03:34.884102 169479 bpfeventpublisher.cpp:310] Initialized BPF probe for syscall open_by_handle_at (163)
I0303 03:03:34.982189 169479 bpfeventpublisher.cpp:297] Failed to load the BPF probe for syscall __x64_sys_execve: The 'enter' program could not be loaded: Failed to open the Linux kernel version header: /usr/include/linux/version.h
I0303 03:03:34.982226 169479 eventfactory.cpp:156] Event publisher not enabled: BPFEventPublisher: Failed to create the function tracer: The 'enter' program could not be loaded: Failed to open the Linux kernel version header: /usr/include/linux/version.h
on kernel 5.4 with Ubuntu 20.04. Probably expected since it's not built from release tag, but the table used to work at 4.6.hubabuba
03/07/2021, 10:49 PMStefano Bonicatti
05/09/2021, 10:11 AMlinux-libc-dev
so that the header is availablesundsta
05/10/2021, 7:13 PMSeth Hanford
05/11/2021, 8:29 PMalessandrogario
8p8c
05/26/2021, 2:48 AMTal Kapon
07/13/2021, 4:10 AMTal Kapon
07/17/2021, 12:37 PMZander Mackie
09/07/2021, 3:30 PM[STD-DEV]15:26:53 root@si-i-0fe66e9061a89d90d /home/zmackie # uname -a
Linux si-i-0fe66e9061a89d90d 5.4.0-1054-aws #57~18.04.1-Ubuntu SMP Thu Jul 15 03:21:36 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
[STD-DEV]15:26:55 root@si-i-0fe66e9061a89d90d /home/zmackie # cat /etc/issue
Ubuntu 18.04.5 LTS \n \l
With --verbose
Zachary Case
09/09/2021, 10:01 PM--disable_events=false
and --enable_bpf_events=true
are set, will this cause osquery to use significantly more memory?
currently I'm testing the 5.0.0 pre-release and am seeing osquery keeps restarting because it exceeds it's memory limit, I've upped the limit to 1G with --watchdog_memory_limit=1000
but I am still seeing memory limits exceeded on some hostsMatt Uebel
09/14/2021, 7:19 PMCptOfEvilMinions
01/18/2022, 11:02 PM--event_max
and --event_expiry
have any effect on BPF events?CptOfEvilMinions
03/24/2022, 8:40 PM2022-03-23 07:53:27
Worker returned exit status
2022-03-23 07:53:08
Error logging the results of query: pack/test-pack/BPF_PROC_EVENTS: IOError: Bad file descriptor
2022-03-23 07:53:08
Error adding new results to database for query pack/test-pack/BPF_PROC_EVENTS: IOError: Bad file descriptor
2022-03-23 07:52:53
RocksDB: [ERROR] [db/db_impl/db_impl_compaction_flush.cc:2541] Waiting after background compaction error: IO error: While appending to file: /var/osquery/osquery.db/052008.sst: Bad file descriptor, Accumulated background error counts: 1
2022-03-23 07:52:53
RocksDB: [WARN] [db/error_handler.cc:334] Background IO error IO error: While appending to file: /var/osquery/osquery.db/052008.sst: Bad file descriptor
2022-03-23 07:52:53
RocksDB: [WARN] [db/db_impl/db_impl_compaction_flush.cc:3019] Compaction error: IO error: While appending to file: /var/osquery/osquery.db/052008.sst: Bad file descriptor
eBPF flags
#### Process Auditing ####
--disable_events=false
--enable_bpf_events=true
--events_optimize=true
--events_expiry=3600
--events_max=200000
Pack queries:
SELECT * FROM bpf_socket_events WHERE local_port != 0;
SELECT * FROM bpf_process_events;
alessandrogario
zwass
bpf_programs
table to list the loaded bpf programs? In any case, very clever use of BPF!seph
āWhen an administrator starts any packet capture tool on the infected machine, BPF bytecode is injected into the kernel that defines which packets should be captured,ā the researchers wrote. āIn this process, Symbiote adds its bytecode first so it can filter out network traffic that it doesnāt want the packet-capturing software to see.ā