agent
agent copied to clipboard
Add ability to intercept syscalls
In order to assess the threat level of the device, we need to be able to extract the syscalls. If we first are able to establish the baseline of commands during normal operations, and then all of the sudden nc
is being executed on the device, this would be highly suspicious. Perhaps it is being used for troubleshooting, but it should raise a warning.
There are a few tools we could potentially do this, including:
- SELinux
- Seccom-bpf
- Apparmor