Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   363

LINUX ENDPOINT HARDENING [GUIDE]

by 7n7 - 05 December, 2022 - 12:31 AM
This post is by a banned member (7n7) - Unhide
7n7  
Infinity
105
Posts
10
Threads
4 Years of service
#1
This document provides recommendations to protect Linux endpoints against adversary
techniques such as lateral movement, privilege escalation, and deploying rootkits or modified
kernel modules that possess either a malicious or destructive capability. Drovorub (https://
media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_
MALWARE_AUG_2020.PDF
) is an example of a Linux malware toolset that includes a kernel
module rootkit that can be leveraged for command and control (C2) communications, file
download and upload capabilities, and the execution of arbitrary commands.


Similar to Windows-based architectures, security protections need to be aligned for Linux
endpoints to harden credentials, access methods, protect the kernel, and bolster auditing and
visibility of activities.


Hidden Content
You must register or login to view this content.

.
This post is by a banned member (lnternet) - Unhide
This post is by a banned member (zelovapu) - Unhide
zelovapu  
Registered
113
Posts
0
Threads
2 Years of service
#3
(05 December, 2022 - 12:31 AM)datadrop Wrote: Show More
This document provides recommendations to protect Linux endpoints against adversary
techniques such as lateral movement, privilege escalation, and deploying rootkits or modified
kernel modules that possess either a malicious or destructive capability. Drovorub (https://
media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_
MALWARE_AUG_2020.PDF
) is an example of a Linux malware toolset that includes a kernel
module rootkit that can be leveraged for command and control (C2) communications, file
download and upload capabilities, and the execution of arbitrary commands.


Similar to Windows-based architectures, security protections need to be aligned for Linux
endpoints to harden credentials, access methods, protect the kernel, and bolster auditing and
visibility of activities.

thank you. let me check it out
This post is by a banned member (ifdwptl12) - Unhide
This post is by a banned member (7n7) - Unhide
7n7  
Infinity
105
Posts
10
Threads
4 Years of service
Bumped #5
This is a bump
.
This post is by a banned member (donny543) - Unhide
donny543  
Registered
27
Posts
0
Threads
2 Years of service
#6
is this still working?
This post is by a banned member (JasonRoss2k) - Unhide
169
Posts
3
Threads
2 Years of service
#7
good stuff g
This post is by a banned member (TestUser404) - Unhide
212
Posts
0
Threads
1 Year of service
#8
(05 December, 2022 - 12:31 AM)7n7 Wrote: Show More
This document provides recommendations to protect Linux endpoints against adversary
techniques such as lateral movement, privilege escalation, and deploying rootkits or modified
kernel modules that possess either a malicious or destructive capability. Drovorub (https://
media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_
MALWARE_AUG_2020.PDF
) is an example of a Linux malware toolset that includes a kernel
module rootkit that can be leveraged for command and control (C2) communications, file
download and upload capabilities, and the execution of arbitrary commands.


Similar to Windows-based architectures, security protections need to be aligned for Linux
endpoints to harden credentials, access methods, protect the kernel, and bolster auditing and
visibility of activities.

nice

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)