This guide provides a comprehensive overview of Linux persistence mechanisms, focusing on scheduled tasks and jobs. It covers: 1. Introduction to persistence in cybersecurity 2. Detailed explanation of T1053 - Scheduled Task/Job technique 3. In-depth analysis of T1053.003 (Cron) and T1053.002 (At) persistence methods 4. Step-by-step instructions on setting up these persistence mechanisms 5. Detection strategies using Elastic SIEM and pre-built rules 6. Hunting techniques using ES|QL and OSQuery 7. Discussion on other persistence methods like Anacron, Fcron, Task Spooler, and Batch The guide aims to educate defenders and security researchers on Linux persistence techniques, their implementation, detection, and mitigation strategies.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A repository containing writeups and solutions from various Capture The Flag cybersecurity competitions spanning from 2015 to 2021.
A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.
A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.
A quick reference guide for the VI editor, covering commands and modes.
A structured approach to managing and responding to suspected security events or incidents.
A collection of detailed CTF challenge writeups organized by category, providing explanations of problems and their solutions for educational purposes.
A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.
A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.
A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.