Search Evasion Techniques
Names, Techniques, Definitions, Keywords
Search Result
41 item(s) found so far for this keyword.
Event Triggered Execution: Linux Inotify Process Manipulating
Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and subscribe to events such as logons or other user activity such as running specific applications/binaries.