RGROSEC
open-menu closeme
Home
About
github linkedin
  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms

    calendar Feb 25, 2025 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms

    In the fifth and final part of the Linux Persistence Detection Engineering series, we bring the journey to its grand finale by exploring some of the most obscure, creative, and complex persistence mechanisms. Building on the foundational concepts covered in previous publications, this final installment focuses on …


    Read More
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms

    calendar Feb 11, 2025 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering -  Approaching the Summit on Persistence Mechanisms

    In the fourth part of the Linux Persistence Detection Engineering series, I continue exploring advanced Linux persistence techniques, expanding on the foundation set in previous publications. This latest installment delves into additional creative and complex methods adversaries use to maintain persistence on Linux …


    Read More
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms

    calendar Jan 27, 2025 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering -  A Continuation on Persistence Mechanisms

    In the third part of the Linux Persistence Detection Engineering series, I continue exploring advanced Linux persistence techniques, expanding on the foundation set in previous publications. This latest installment dives into more creative and complex persistence methods, providing security researchers and defenders …


    Read More
  • Linux Detection Engineering - A sequel on persistence mechanisms

    calendar Aug 29, 2024 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering - A sequel on persistence mechanisms

    In this second part of the Linux Persistence Detection Engineering series, I explore the world of more advanced Linux persistence techniques. This part builds upon the knowledge obtained from the previous persistence blog dubbed "Linux Detection Engineering - A Primer on Persistence Mechanisms". This sequel …


    Read More
  • Linux Detection Engineering - A primer on persistence mechanisms

    calendar Aug 23, 2024 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering -  A primer on persistence mechanisms

    In this first installment of the Linux Persistence Detection Engineering series, I delve into Linux persistence mechanisms, exploring both common and complex techniques to enhance the knowledge of defenders and security researchers. I examine how these persistence methods operate, how to set them up, and most …


    Read More

Featured Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Recent Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Categories

ELASTIC 11 DETECTION-ENGINEERING 8 WALKTHROUGHS 7 LINUX 5 PERSISTENCE 5 WEB-APPLICATION-HACKING 4 MALWARE-ANALYSIS 3 BINARY-EXPLOITATION 2 PRIVILEGE-ESCALATION 2 CVE 1

Tags

LINUX 18 ELASTIC 11 DETECTION-ENGINEERING 8 HACK-THE-BOX 7 HUNTING 5 PERSISTENCE 5 OWASP 4 WEBAPP 4 WINDOWS 4 MALWARE-ANALYSIS 3 BUFFER-OVERFLOW 2 PRIVILEGE-ESCALATION 2 AUDITD 1 CVE 1
RGROSEC

Copyright  RGROSEC. All Rights Reserved

to-top