Linux Defense Evasion – Hiding Processes | Red Team Series 11-13
In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques. We will be taking a look at libprocesshider, and other methods of evading attacks.
1:32 What We Will Be Covering
1:40 Defense Evasion Techniques
3:02 Reviewing the Target Environment
4:45 Where to Download libprocesshider
5:29 Cloning the libprocesshider Repo
6:17 Compiling libprocesshider
6:51 Creating a Python Script for Reverse Web Shell Access
9:16 How our Python Script Works
11:28 How libprocesshider Works
14:39 Compiling our libprocesshider Script
15:03 Loading the Script into the Target
16:47 Verifying if the Script Works
New to Linode? Get started here with a $100 credit!
Read the doc for more information on the Hackersploit Red Team series.
Learn more about Linux Defense Evasion.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #RedTeam #Defense ; @HackerSploit
Linux Persistence Techniques | Red Team Series 10-13
You might also like…
Linux Persistence Techniques | Red Team Series 10-13In this video in our Hackersploit Red Team series, we will cover part 10 of our series on Linux Persistence Techniques.
What Exactly is High Availability? Failover & High Availability Demonstration from ZSecurityHigh availability (HA) is a term that describes a website or application with maximum uptime and accessibility for the content stored on it.
Linux Defense Evasion – Hiding Processes | Red Team Series 11-13In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques.
How to Deploy and Secure Your MERN App on LinodeIn this video, @codinginflow will show you how to deploy & secure a NodeJS/React application on a Linode and connect it to a domain.