Hidden Linux Binary Threats for Intruders and Malware
文章讨论了Linux系统中隐藏二进制文件的恶意行为及其检测方法,并介绍了如何通过命令行取证查找运行可疑隐藏二进制的进程。Sandfly无需部署代理即可识别此类攻击。 2025-1-15 21:38:59 Author: sandflysecurity.com(查看原文) 阅读量:1 收藏

Sandfly Blog

Linux attackers and malware often hide their binary payloads. In this video we'll discuss what this threat is, why it is done, and how to find processes running with hidden binaries using command line forensics.

In this video we cover:

  • Hidden Linux binaries and why they are often malicious.
  • Investigating hidden binaries.
  • Locating Linux processes running with a suspicious hidden binary.

Sandfly is able to find this and many other types of Linux attacks without deploying any endpoint agents. Get your free license today or contact us for more information.

Transcript available on the YouTube video above.



文章来源: https://sandflysecurity.com/blog/hidden-linux-binary-threats-for-intruders-and-malware
如有侵权请联系:admin#unsafe.sh