Linux Defense Evasion – Hiding Processes | Red Team Series 11-13
In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques. We will be taking a look at libprocesshider, and other methods of evading attacks.
1:32 What We Will Be Covering
1:40 Defense Evasion Techniques
3:02 Reviewing the Target Environment
4:45 Where to Download libprocesshider
5:29 Cloning the libprocesshider Repo
6:17 Compiling libprocesshider
6:51 Creating a Python Script for Reverse Web Shell Access
9:16 How our Python Script Works
11:28 How libprocesshider Works
14:39 Compiling our libprocesshider Script
15:03 Loading the Script into the Target
16:47 Verifying if the Script Works
New to Linode? Get started here with a $100 credit!
Read the doc for more information on the Hackersploit Red Team series.
Learn more about Linux Defense Evasion.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #RedTeam #Defense ; @HackerSploit
Linux Persistence Techniques | Red Team Series 10-13
You might also like…
HackerSploit: Docker Security EssentialsHackersploit: Docker Security Essentials is a guide to auditing and securing the Docker platform and containers.
Linux Defense Evasion – Hiding Processes | Red Team Series 11-13In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques.
Bitwarden | Manage And Secure Your PasswordsIn this video, we'll use Cloudron to easily install & host your own Bitwarden instance using Valtwarden, a FOSS interpretation of Bitwarden.
Windows Red Team Persistence Techniques | Red Team Series 5-12This guide is part of the HackerSploit Red Team series of guides and references Windows Red Team Persistence Techniques.