[Intel]: https://www.blackhat.com/presentations/bh-dc-08/Beauchamp-Weston/Whitepaper/bh-dc-08-beauchamp-weston-WP.pdf
timb-machine opened this issue · 0 comments
timb-machine commented
Area
Offensive techniques
Parent threat
Persistence, Defense Evasion
Finding
Industry reference
uses:DTrace
Malware reference
No response
Actor reference
No response
Component
Solaris
Scenario
Internal specialist services
Scenario variation
Device application sandboxing