Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked When investigating a suspicious process on Linux, try this:


dEEpEst

Recommended Posts

When investigating a suspicious process on Linux, try this: 

This is the hidden content, please

 

For example, a socat command was used to spawn a reverse bindshell backdoor. Environ entry shows SSH connection data and traces to the socat comand. Some versions of netcat do similar. 

 

Many attackers do not wipe their process environment and this can leave behind high fidelity forensics to help investigate. Many programs leave really obvious data in the process environment. It's there for the asking on Linux.

This is the hidden content, please
/applications/core/interface/js/spacer.png">

This is the hidden content, please
/applications/core/interface/js/spacer.png">

Link to comment
Share on other sites

  • ADMINdEEpEst changed the title to When investigating a suspicious process on Linux, try this:
Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.