Rootkits
Linux Stealth Rootkit Process Decloaking Tool Updated
Decloaking Linux stealth rootkits that are hiding processes from view is easy with our free tool sandfly-processdecloak which has been updated below: sandfly-processdecloak on Github This free tool…
How To Detect and Decloak Linux Stealth Rootkit Data
Linux stealth rookits have a variety of mechanisms to hide on a host. Aside from standard tactics such as hiding running processes (which we show you how to decloak here ), they also can hide data…
Linux Stealth Rootkit Malware with EDR Evasion
Recently, Sandfly was contacted to investigate an incident involving a novel piece of Linux stealth malware. What made this malware interesting is it deployed a full stealth rootkit to hide itself,…
Linux Command Line Forensics and Intrusion Detection Cheat Sheet
Below is our Linux command line forensics and intrusion detection cheat sheet along with a presentation given at Purplecon 2018 . These resources can help you investigate a Linux host for compromise…
Detecting and Investigating OpenSSL Backdoors on Linux
A nightmare for security personnel on Linux is to find a backdoor operating. This means an attacker is interacting with the host in real-time to further their intrusion. Of various backdoors that can…
Linux Malware Investigation Myth: You Don’t Need a Debugger
A big myth around investigating Linux ransomware and malware is that the first tool you need is a debugger and deep knowledge of assembly to understand what it does. It’s easy for admins and security…