BPFDoor Evasive Linux Backdoor and Malware Forensic Investigation Presentation

  Рет қаралды 2,069

Sandfly Security

Sandfly Security

Күн бұрын

Пікірлер: 17
@nickknows4249
@nickknows4249 9 ай бұрын
Best video I’ve seen on BPFDoor. Please take my money for a Linux forensics course!
@SandflySecurity
@SandflySecurity 9 ай бұрын
Thanks for the comment. No plans for a course yet, but our product can teach you a lot about Linux forensics by just what it does. We have a free license for home lab users that may be of interest.
@shiverello6109
@shiverello6109 14 күн бұрын
Very well explained, any Linux admin could detect this backdoor after the video. Much appreciated
@SandflySecurity
@SandflySecurity 14 күн бұрын
Thanks for watching!
@Ichinin
@Ichinin Жыл бұрын
This was exceptionally good, especially the sniffer detection tips.
@SandflySecurity
@SandflySecurity 11 ай бұрын
Thanks for the compliment.
@johnf216
@johnf216 Жыл бұрын
Great video, thanks for taking the time to record and share it.
@SandflySecurity
@SandflySecurity 11 ай бұрын
Thanks for watching.
@cyberlabz
@cyberlabz Жыл бұрын
Great video!! This is gold!! Thank you.
@SandflySecurity
@SandflySecurity 11 ай бұрын
Thanks for watching.
@a.r.5779
@a.r.5779 Жыл бұрын
Thank you very much, very very instructive.
@SandflySecurity
@SandflySecurity 11 ай бұрын
Thanks for watching.
@comosaycomosah
@comosaycomosah 8 ай бұрын
Pretty fire channel!
@SandflySecurity
@SandflySecurity 8 ай бұрын
Thanks. Please spread the word!
@artemis-arrow-3579
@artemis-arrow-3579 5 ай бұрын
eh, I wrote a stealth malware called gorgon, absolutely no impact on the system, no slowing down, no bugging the system, nothing, mainly due to some design elements I came up with, it's also compatible with pretty much every kernel version since 2.something point is, if someone is skilled enough, and puts the time and effort into a rootkit, they can design something truly invisible
@SandflySecurity
@SandflySecurity 5 ай бұрын
Thanks for the comment. No doubt it's possible to hide on Linux for quite a while.
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 145 М.
Beginner's Guide To The Linux Terminal
42:27
DistroTube
Рет қаралды 405 М.
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
Rob Joyce Interview -  Linux Critical Infrastructure Threats
33:25
Sandfly Security
Рет қаралды 509
Why More People Dont Use Linux
18:51
ThePrimeTime
Рет қаралды 333 М.
CSC6585 2024 Case Study
55:43
SJ
Рет қаралды 249
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 161 М.
Linux Backdoor Deep Dive (Part 1)
33:28
LaurieWired
Рет қаралды 10 М.
Linux Threat Hunting Tactics and Techniques vs. Signatures
3:30
Sandfly Security
Рет қаралды 214
Malware Development: Processes, Threads, and Handles
31:29
Live Incident Response with Velociraptor
1:09:18
Recon InfoSec
Рет қаралды 26 М.