A client just asked for info on *nix commands that are most often run by attackers vs. legitimate users that we can find with auditd. Some things I thought of: ssh tunneling params stunnel nc cat/head/tail/more/less <critical config files> What else? Any cheat sheets out there?
50
32
3
180
Replying to @MalwareJake
chsh, usermod export HIST<anything> running commands from non-standard bin dirs (e.g. /tmp, /dev/shm)

Sep 11, 2020 · 11:13 PM UTC

6