Education

Linux Process Running from /dev/shm RAM Disk Attack

Videos
Education
Linux Forensics
December 19, 2024

The Linux RAM disk in /dev/shm is a favorite place for malware to hide. The RAM disk is not frequently checked and is volatile so the malware can be sure it leaves not traces on disk if the system…

Deleted Process Binary Attack on Linux

Videos
Education
Linux Forensics
December 19, 2024

Malware on Linux will often delete the on-disk binary to evade detection with traditional anti-virus and file integrity monitoring tools. In this video we will discuss the threat and how to find it…

SSH Excessive Keys Risk - Do You Have Too Many SSH Keys?

Videos
Education
Linux Forensics
December 12, 2024

Do you have too many SSH keys on Linux? Probably. Having too many SSH keys on Linux accounts presents a credential theft and backdoor risk. Besides not knowing who can login with an account that has…

SSH Authorized Keys2 Backdoor Attack

Videos
Education
Linux Forensics
December 11, 2024

SSH has a little known way to leave behind backdoor keys, and that is by using the deprecated authorized_keys2 file. Many Linux users are unaware of this feature and what risks it poses. In this…

Risky Business Snake Oilers Interview with Sandfly Security

Videos
Education
Linux Forensics
December 10, 2024

Join us for an interview on the Risky Business Snake Oilers segment where we talk about agentless Linux security and Sandfly. We cover the problem of Linux security monitoring with traditional EDR…

Default User SSH Authorized Key Risks on Linux

Videos
Education
Linux Forensics
December 09, 2024

Default Linux users with SSH authorized keys are a way for attackers to hide backdoor accounts that can avoid detection for some time. In this video we discuss and demonstrate the threat, why it's…