
Linux Detection Engineering - A primer on persistence mechanisms
#Knowledge Base#Write-ups
A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
This guide offers a detailed overview of Linux persistence mechanisms, emphasizing scheduled tasks and jobs
This guide offers a detailed overview of Linux persistence mechanisms. It specifically emphasizes the importance of scheduled tasks and jobs in maintaining system operations.
Overview of Persistence in Cybersecurity
1. Introduction to persistence in cybersecurity
2. Detailed explanation of T1053 - Scheduled Task/Job technique
3. In-depth analysis of T1053.003 (Cron) and T1053.002 (At) persistence methods
4. Step-by-step instructions for setting up these persistence mechanisms
5. Detection strategies utilizing Elastic SIEM and pre-built rules
6. Hunting techniques with ES|QL and OSQuery
7. Discussion on additional persistence methods such as Anacron, Fcron, Task Spooler, and Batch
The guide aims to educate defenders and security researchers on Linux persistence techniques
This guide is designed to inform defenders and security researchers about Linux persistence techniques. It covers their implementation, how to detect them, and strategies for mitigation.