Linux Red Team Defense Evasion Techniques - Hiding Linux Processes

In this video, I explore the process of evading defenses on Linux by hiding Linux processes with libprocesshider. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses. Process Hider GitHub Repository: //PLATFORMS BLOG ►► FORUM ►► ACADEMY ►► //SOCIAL NETWORKS TWITTER ►► DISCORD ►► INSTAGRAM ►► LINKEDIN ►► PATREON ►► MERCHANDISE ►► //BOOKS Privilege Escalation Techniques ►► Docker Security Essentials (FREE) ►► //SUPPORT THE CHANNEL NordVPN Affiliate Link (73% Off) ►► Get $100 In Free Linode Credit ►► Get started with Intigriti: //CYBERTALK PODCAST Spotify ►► Apple Podcasts ►► //WE VALUE YOUR FEEDBACK We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. //THANK YOU! Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d’avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة ----------------------------------------------------------------------------------- #redteaming #cybersecurity #pentesting
Back to Top