RGROSEC
open-menu closeme
Home
About
github linkedin
  • Linux detection engineering with Auditd

    calendar Apr 9, 2024 · 1 min read · Detection Engineering Linux Auditd Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux detection engineering with Auditd

    In this article, I explore how to effectively use Auditd and Auditd Manager for detection engineering. I’ll demonstrate Auditd's powerful features, guide you through the setup process, and show you how to create and modify rules to capture specific behaviors. You'll also learn how to interpret the logs and discover how …


    Read More

Featured Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Recent Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Categories

ELASTIC 11 DETECTION-ENGINEERING 8 WALKTHROUGHS 7 LINUX 5 PERSISTENCE 5 WEB-APPLICATION-HACKING 4 MALWARE-ANALYSIS 3 BINARY-EXPLOITATION 2 PRIVILEGE-ESCALATION 2 CVE 1

Tags

LINUX 18 ELASTIC 11 DETECTION-ENGINEERING 8 HACK-THE-BOX 7 HUNTING 5 PERSISTENCE 5 OWASP 4 WEBAPP 4 WINDOWS 4 MALWARE-ANALYSIS 3 BUFFER-OVERFLOW 2 PRIVILEGE-ESCALATION 2 AUDITD 1 CVE 1
RGROSEC

Copyright 2025 RGROSEC. All Rights Reserved

to-top