agent icon indicating copy to clipboard operation
agent copied to clipboard

Add ability to intercept syscalls

Open vpetersson opened this issue 5 years ago • 2 comments

In order to assess the threat level of the device, we need to be able to extract the syscalls. If we first are able to establish the baseline of commands during normal operations, and then all of the sudden nc is being executed on the device, this would be highly suspicious. Perhaps it is being used for troubleshooting, but it should raise a warning.

There are a few tools we could potentially do this, including:

  • SELinux
  • Seccom-bpf
  • Apparmor

vpetersson avatar Mar 12 '19 10:03 vpetersson