timb-machine/linux-malware

[Intel]: https://www.blackhat.com/presentations/bh-dc-08/Beauchamp-Weston/Whitepaper/bh-dc-08-beauchamp-weston-WP.pdf

timb-machine opened this issue · 0 comments

Area

Offensive techniques

Parent threat

Persistence, Defense Evasion

Finding

https://www.blackhat.com/presentations/bh-dc-08/Beauchamp-Weston/Whitepaper/bh-dc-08-beauchamp-weston-WP.pdf

Industry reference

uses:DTrace

Malware reference

No response

Actor reference

No response

Component

Solaris

Scenario

Internal specialist services

Scenario variation

Device application sandboxing