We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Defensive techniques
Execution, Persistence, Privilege Escalation, Defense Evasion
https://sandflysecurity.com/blog/detecting-linux-binary-file-poisoning/
attack:T1574:Hijack Execution Flow attack:T1204:User Execution attack:T1218:System Binary Proxy Execution attack:T1036.003:Rename System Utilities
No response
Linux, AIX, Solaris, HP-UX
The text was updated successfully, but these errors were encountered:
timb-machine
No branches or pull requests
Area
Defensive techniques
Parent threat
Execution, Persistence, Privilege Escalation, Defense Evasion
Finding
https://sandflysecurity.com/blog/detecting-linux-binary-file-poisoning/
Industry reference
attack:T1574:Hijack Execution Flow
attack:T1204:User Execution
attack:T1218:System Binary Proxy Execution
attack:T1036.003:Rename System Utilities
Malware reference
No response
Actor reference
No response
Component
Linux, AIX, Solaris, HP-UX
Scenario
No response
The text was updated successfully, but these errors were encountered: