A direct system call bypasses the standard user-mode API (such as ntdll.dll on Windows or libc on Linux) by invoking the system call instruction (e.g., syscall, int 0x80) manually, often used in evasion techniques to avoid user-mode hooks or monitoring.
direct system call
2025-04-23
Recent Posts
Linux Persistence: Modular Software
2025-04-17 DFIR CTF persistence linux persistence apache asterisk
Linux Persistence: Web Shells
2025-04-16 DFIR persistence webshell linux persistence webshell apache nginx PHP
Linux Persistence: Rootkits
2025-04-15 DFIR persistence rootkit LKM linux persistence LKM rootkit LD_PRELOAD kprobe ftrace ld.so hooking
Defanging Linux LKM Rootkits With cleanup_module()
2025-04-05 Linux LKM rootkits EDR hooks incident response Linux LKM rootkit