shell functions can be used as a crude userland rootkit. Attackers can add functions to the shell with the same name as certain system commands (ls, find, netstat, …) that filter out IoCs related to the attacker.
shell function as userland rootkit
0001-01-01
Recent Posts
Linux Persistence: Startup Scripts
2024-11-10 DFIR CTF linux persistence systemd SysV init startup script
Linux Persistence: Cron
2024-11-10 DFIR CTF linux persistence cron