Detecting rogue processes and their ports in Linux
Contrary to popular belief, Linux is not impervious to malware. Yes, it is highly resistant, but there's always one method of entry for malware that works on every platform. The user. Social engineering and phishing scams etc. can all trick users into bypassing the otherwise excellent security model that Linux uses. And of course as long as bugs and stack overflows and the like exist, there are automated ways into the system.
However it gets there, one way to find malware is to look for processes and ports that don't belong to known processes and are hidden from normal view.
https://www.cyberciti.biz/tips/linux-unix-windows-find-hidden-processes-tcp-udp-ports.html
No comments:
Post a Comment