RGROSEC
open-menu closeme
Home
About
github linkedin
  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms

    calendar Feb 25, 2025 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms

    In the fifth and final part of the Linux Persistence Detection Engineering series, we bring the journey to its grand finale by exploring some of the most obscure, creative, and complex persistence mechanisms. Building on the foundational concepts covered in previous publications, this final installment focuses on …


    Read More
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms

    calendar Feb 11, 2025 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering -  Approaching the Summit on Persistence Mechanisms

    In the fourth part of the Linux Persistence Detection Engineering series, I continue exploring advanced Linux persistence techniques, expanding on the foundation set in previous publications. This latest installment delves into additional creative and complex methods adversaries use to maintain persistence on Linux …


    Read More
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms

    calendar Jan 27, 2025 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering -  A Continuation on Persistence Mechanisms

    In the third part of the Linux Persistence Detection Engineering series, I continue exploring advanced Linux persistence techniques, expanding on the foundation set in previous publications. This latest installment dives into more creative and complex persistence methods, providing security researchers and defenders …


    Read More
  • Declawing PUMAKIT

    calendar Dec 12, 2024 · 1 min read · Malware Analysis Linux Elastic  ·
    Share on: twitter facebook linkedin copy
    Declawing PUMAKIT

    At Elastic Security Labs, we uncovered PUMAKIT, a sophisticated multi-stage Linux malware with advanced rootkit capabilities. Initially identified through routine threat hunting on VirusTotal, PUMAKIT consists of a dropper (cron), two memory-resident executables, an LKM rootkit module, and a userland shared object (SO) …


    Read More
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection

    calendar Nov 15, 2024 · 1 min read · Detection Engineering Linux Elastic  ·
    Share on: twitter facebook linkedin copy
    Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection

    At Elastic, we recognize the critical need for securing containerized applications in Kubernetes and cloud environments. To enhance runtime security, we’ve integrated Falco—an open-source cloud-native security tool—directly with Elastic Security. Falco leverages Linux kernel events and plugins to detect abnormal …


    Read More
  • Cups Overflow: When your printer spills more than Ink

    calendar Sep 28, 2024 · 1 min read · CVE Detection Engineering Linux Elastic  ·
    Share on: twitter facebook linkedin copy
    Cups Overflow: When your printer spills more than Ink

    At Elastic Security Labs, we analyzed a critical set of vulnerabilities in the CUPS printing system, disclosed by security researcher Simone Margaritelli (@evilsocket) on September 26, 2024. These flaws, affecting CUPS versions ≤ 2.0.1, enable unauthenticated remote attackers to achieve remote code execution (RCE) via …


    Read More
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse

    calendar Sep 27, 2024 · 1 min read · Malware Analysis Linux Elastic  ·
    Share on: twitter facebook linkedin copy
    Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse

    At Elastic Security Labs, we uncovered a sophisticated Linux malware campaign exploiting Apache2 servers since March 2024. Attackers used multiple malware families, including KAIJI (DDoS) and RUDEDEVIL (crypto miner), along with custom tools for persistence and control. They leveraged C2 channels disguised as kernel …


    Read More
  • Linux Detection Engineering - A sequel on persistence mechanisms

    calendar Aug 29, 2024 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering - A sequel on persistence mechanisms

    In this second part of the Linux Persistence Detection Engineering series, I explore the world of more advanced Linux persistence techniques. This part builds upon the knowledge obtained from the previous persistence blog dubbed "Linux Detection Engineering - A Primer on Persistence Mechanisms". This sequel …


    Read More
  • Linux Detection Engineering - A primer on persistence mechanisms

    calendar Aug 23, 2024 · 1 min read · Detection Engineering Hunting Linux Persistence Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux Detection Engineering -  A primer on persistence mechanisms

    In this first installment of the Linux Persistence Detection Engineering series, I delve into Linux persistence mechanisms, exploring both common and complex techniques to enhance the knowledge of defenders and security researchers. I examine how these persistence methods operate, how to set them up, and most …


    Read More
  • Linux detection engineering with Auditd

    calendar Apr 9, 2024 · 1 min read · Detection Engineering Linux Auditd Elastic  ·
    Share on: twitter facebook linkedin copy
    Linux detection engineering with Auditd

    In this article, I explore how to effectively use Auditd and Auditd Manager for detection engineering. I’ll demonstrate Auditd's powerful features, guide you through the setup process, and show you how to create and modify rules to capture specific behaviors. You'll also learn how to interpret the logs and discover how …


    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • »
    • »»

Featured Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Recent Posts

  • Linux Detection Engineering - The Grand Finale on Linux Persistence Mechanisms
  • Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
  • Linux Detection Engineering - A Continuation on Persistence Mechanisms
  • Declawing PUMAKIT
  • Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection
  • Cups Overflow: When your printer spills more than Ink
  • Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
  • Linux Detection Engineering - A sequel on persistence mechanisms

Categories

ELASTIC 11 DETECTION-ENGINEERING 8 WALKTHROUGHS 7 LINUX 5 PERSISTENCE 5 WEB-APPLICATION-HACKING 4 MALWARE-ANALYSIS 3 BINARY-EXPLOITATION 2 PRIVILEGE-ESCALATION 2 CVE 1

Tags

LINUX 18 ELASTIC 11 DETECTION-ENGINEERING 8 HACK-THE-BOX 7 HUNTING 5 PERSISTENCE 5 OWASP 4 WEBAPP 4 WINDOWS 4 MALWARE-ANALYSIS 3 BUFFER-OVERFLOW 2 PRIVILEGE-ESCALATION 2 AUDITD 1 CVE 1
RGROSEC

Copyright 2025 RGROSEC. All Rights Reserved

to-top