Skip to content
  • Home
  • Services
    • Combo Plans
      • Shared Support
      • Semi Dedicated Support
      • Dedicated Support
    • Control Panel Support
      • DirectAdmin Support
      • cPanel Support
      • Plesk Support
    • Server Setup & Support
  • Products
    • Managed Migration
    • Nginx Support
    • Varnish Support
    • Shield
  • Careers
    • Internship Programme
  • KnowledgeBase
  • Contact Us
  • Blog
  • About Us

WHM-cPanel Control Panel

4
  • How to log in to cPanel?
  • How to find outdated services in cPanel
  • Exclude services from the outdated services script’s check in cPanel
  • catch-all accounts, and how to add that in cPanel

Email

3
  • How to install mail function on a Centos server.
  • SPF, DKIM, and DMARC records explained
  • How to configure an Email account manually on the Thunderbird client

SSL certificates

3
  • How to install SSL on nginx with Let’s Encrypt
  • SSL installation and renewal on an Nginx server
  • Installation of SSL in Haproxy and HTTP to HTTPS Redirection

Webservers

1
  • Enable GZIP compression in Nginx

Security

1
  • Disabling mail alerts from LFD

News

46
  • White House report on Open-source AI models
  • Linux Kernel 6.9 – End of Life
  • Verify if SystemD or not on Linux
  • SLUBStick: A Groundbreaking Kernel Exploitation Technique
  • Top 5 Linux Distros for Every User Level
  • Alpaca: The Open-Source AI Model for Linux Enthusiasts
  • Zero-Day Threat: The Risks of the IP Address Exploit
  • Intel Engineer Boosts Linux Kernel Boot Time by 0.035 Seconds
  • Canonical’s New Aggressive Kernel Policy: Ubuntu Releases
  • KDE Frameworks 6.5 Released: What’s New?
  • Ubuntu 24.10 to Feature the Latest Linux Kernel
  • Linux 6.11-rc3 Released: Performance Boosts and Key Fixes
  • The Open Model Initiative Joins the Linux Foundation
  • New Study Debunks Fears of AI Threats
  • AI-Powered Screenshot Search for Pixel 9 Devices
  • Fastfetch: A High-Performance Alternative to Neofetch
  • Containers: Efficient OS-Level Virtualization & Top Tools
  • Tails 6.6-Enhanced Security, Anonymity,Decentralized Features
  • Kubernetes 1.31 “Elli” Release: New Features and Updates
  • Unleashing the Power of Arch Linux with Archinstall 2.8.2
  • Deepin 23 Released with Atomic Updates and Broad CPU Support
  • Secure Your Linux Systems with Expert Cybersecurity
  • NGINX Fixes Buffer Overread Vulnerability (CVE-2024-7347)
  • Linux Kernel Flaw Lets Attackers Bypass CPU and Write to Memory
  • 0.0.0.0 Day Vulnerability:18-Year-Old Browser Flaw
  • CachyOS August 2024: Open NVIDIA Modules & COSMIC Desktop
  • Windows Update Breaks Linux Boot on Dual-Boot Systems
  • EasyOS 6.2 Released: Lightweight Linux Distro-New Features
  • Upstreaming Linux Kernel Support for Raspberry Pi 5
  • Canonical Pauses Ubuntu Kernel Updates Until October 2024
  • 9 Years of LVFS: Transforming Linux Firmware Updates
  • Record Bounty Awarded for LiteSpeed Cache Vulnerability
  • Red Hat OpenShift Lightspeed: AI Assistant for OpenShift
  • Linux 6.12 Introduces QR Code in DRM Panic Handler
  • Rust for Linux Maintainer Resigns Amid ‘Nontechnical Nonsense’
  • Ubuntu 24.10 to Feature Latest Linux 6.11 Kernel
  • LinkedIn Migrates from CentOS to Azure Linux
  • Linux 6.11-rc5 Released with Streamlined Bcachefs Fixes
  • AMD Preferred Core Fix Arrives Before Linux 6.11-rc6
  • Debian 12.7 Released: 55 Security Updates, 51 Bug Fixes
  • 4MLinux 46 Released: New Apps, LAMP Server Included
  • Cicada3301 Ransomware Targets VMware ESXi Systems
  • Advanced Linux Persistence Techniques: Elastic Security’s Insights
  • Sedexp Malware Evades Detection for Two Years on Linux
  • Minimal Linux Runs on Raspberry Pi’s RP2350 Microcontroller
  • Manage Linux User Activity with Acct/Psacct

Operating System

1
  • CentOS 7 End-of-Life: What You Need to Know and How to Migrate
  • Home
  • KnowledgeBase
  • News
  • Advanced Linux Persistence Techniques: Elastic Security’s Insights
View Categories

Advanced Linux Persistence Techniques: Elastic Security’s Insights

3 min read

Ruben Groenewoud from Elastic Security recently released a detailed analysis of advanced persistence mechanisms on Linux systems. This new installment in the Linux Detection Engineering series explores both traditional and sophisticated techniques that threat actors use to maintain persistence.

Key Techniques Explored #

Groenewoud’s article thoroughly examines various methods threat actors use to keep unauthorized access on Linux systems. These methods range from older init systems like System V and Upstart to more advanced strategies such as udev rules and Git hooks. Understanding these techniques is essential for defenders and security researchers who aim to strengthen detection and hunting capabilities.

  • Init Systems: Even though Systemd is widely used, older init systems still offer exploitable persistence opportunities. Groenewoud explains how System V and Upstart, while less common, continue to serve as attack vectors.
  • Run Control Scripts: The article highlights the potential misuse of boot scripts like rc.local in maintaining persistent access. Groenewoud provides clear examples to demonstrate how attackers might exploit these scripts.
  • Message of the Day (MOTD): Often overlooked, MOTD scripts present a stealthy method for persistence. Groenewoud outlines how these scripts operate and offers strategies to detect their misuse.
  • Udev Rules: The article explores how threat actors use the Linux device manager, udev, for persistence. Groenewoud also discusses practical methods for detecting and preventing such attacks.
  • Package Managers: Groenewoud details how attackers can exploit APT, YUM, and DNF package managers through hooks and plugins. He stresses the importance of vigilance in managing software installations to prevent these exploits.
  • Git Hooks and Pager Configurations: The misuse of Git hooks and pager configurations to execute arbitrary code is another advanced technique that Groenewoud discusses. He suggests effective detection methods to combat these threats.
  • Process Capabilities: The article covers how threat actors can abuse process capabilities, designed for fine-grained access control, for persistence and privilege escalation. Groenewoud emphasizes the need for robust detection strategies.
  • System Binary Hijacking: Techniques for hijacking system binaries to run malicious code are also explored. Groenewoud provides actionable detection strategies to help identify these threats.

Tools and Detection Strategies #

Groenewoud introduces PANIX, a tool developed by Elastic Security that simplifies the setup and testing of various persistence mechanisms. PANIX enables security professionals to simulate attacks and evaluate their detection capabilities.

  • PANIX Key Features:
    • Simplified Setup: PANIX automates the process of establishing various persistence mechanisms, allowing users to focus on developing effective detection strategies.
    • Customizable Testing: PANIX provides flexibility by letting users test different persistence techniques. This makes it a versatile tool for evaluating detection effectiveness across multiple scenarios.
    • Comprehensive Coverage: PANIX supports a wide range of persistence methods, ensuring thorough testing in different Linux environments.
    • Integration with Detection Tools: PANIX integrates with Elastic’s detection rules and works seamlessly to generate events that can be analyzed using SIEM and endpoint detection tools.

For example, to set up a System V init script for persistence, you can run the following command:

This command creates a backdoor that activates upon system boot, helping security teams identify gaps in their existing detection rules.

Conclusion #

By the end of Groenewoud’s series, readers will gain a robust understanding of Linux persistence mechanisms and how to detect them using SIEM and endpoint rules. The series encourages a proactive approach to threat hunting by leveraging tools like ES|QL and OSQuery to uncover hidden threats.

Elastic Security Labs’ third installment in the Linux Detection Engineering series is an essential read for cybersecurity professionals and researchers. It provides critical insights into understanding and mitigating advanced persistence threats on Linux systems.

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on September 2, 2024
Linux Kernel 6.9 – End of Life

Powered by BetterDocs

Table of Contents
  • Key Techniques Explored
  • Tools and Detection Strategies
    • Conclusion

The last technical support you will ever need!

select one of our plans and start building the most wanted app/website available today. We make sure every aspect of the server maintenance are handled with  a level of expertise needed for growing your business!

Copyright 2025 techprovidence