Linux EDR Reverse Shell Detection, Investigation, and Forensics

Поделиться
HTML-код
  • Опубликовано: 20 янв 2025

Комментарии • 9

  • @Yayaisbadatchess
    @Yayaisbadatchess Месяц назад +5

    So glad the algorithm suggested this video, awesome!

    • @SandflySecurity
      @SandflySecurity  Месяц назад

      Thanks for the compliment and watching. We will be posting a lot more of these short topic videos so please subscribe.

    • @Yayaisbadatchess
      @Yayaisbadatchess Месяц назад

      @SandflySecurity Already did! Also maybe if it's possible to make the red font a little brighter ☺️

    • @SandflySecurity
      @SandflySecurity  Месяц назад

      Thanks for the feedback. We'll fix for next time.

  • @mizzlehd8742
    @mizzlehd8742 4 дня назад

    I am not sure i understand why peekfd is more risky compared to using commands that are inspecting traffic and env information. Could you elaborate on that?

    • @SandflySecurity
      @SandflySecurity  4 дня назад

      Mainly in the context of the attacker may see you running the command and know they've been seen or are being watched. It's not very stealthy.

  • @loremipsum685
    @loremipsum685 Месяц назад +2

    Forgot how useful peekfd is!

  • @tracyrreed
    @tracyrreed Месяц назад

    Backdoors aren't very interesting. Anyone can write a backdoor to run as root/admin on any OS. How they get installed is much more interesting. If you use SELinux or fapolicyd then this backdoor (or any other) can't run.