Главная
Study mode:
on
1
Intro
2
Why Auditd
3
Motivation
4
Background
5
Outline
6
System Calls
7
Julia Evans zine
8
Open call
9
Addie
10
Addie History
11
Oddity
12
Audit Rules
13
Example Configuration
14
File Watch Role
15
Reporting Example
16
Attack Scenario
17
Attack Setup
18
execve
19
results
20
false positives
21
post behavior
22
solutions
23
questions
Description:
Explore Linux post-exploitation detection using Auditd in this 22-minute conference talk from BSidesLV 2015. Delve into the motivations behind Auditd, its background, and key components such as system calls and audit rules. Learn about example configurations, file watch roles, and reporting examples. Examine an attack scenario, including setup, execve results, false positives, and post-behavior solutions. Gain insights into effective Linux security monitoring and threat detection techniques.

Catching Linux Post-Exploitation with Auditd

BSidesLV
Add to list