Completed
Outline
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Catching Linux Post-Exploitation with Auditd
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why Auditd
- 3 Motivation
- 4 Background
- 5 Outline
- 6 System Calls
- 7 Julia Evans zine
- 8 Open call
- 9 Addie
- 10 Addie History
- 11 Oddity
- 12 Audit Rules
- 13 Example Configuration
- 14 File Watch Role
- 15 Reporting Example
- 16 Attack Scenario
- 17 Attack Setup
- 18 execve
- 19 results
- 20 false positives
- 21 post behavior
- 22 solutions
- 23 questions