Evasive Techniques Used By Malicious Linux Shell Scripts

Advisories

Discover Hacks/Cracks News

Evasive Techniques Used By Malicious Linux Shell Scripts

Evasive Techniques Used By Malicious Linux Shell Scripts

Learn about common defense evasion techniques used in malicious shell scripts and how Uptycs detects them.

Attackers use malicious shell scripts as an initial vector to download malicious payloads to the victim system. In the earlier days, base64 and other common encoding schemes were used to evade defensive parameters. But nowadays, threat actors are adopting newer techniques that include commands to disable firewalls, monitoring agents etc.

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.