小侃威胁情报(一)
威胁情报的体系思考
This post is part of a series about Offensive BPF that I’m working on to learn how BPFs use will impact offensive security, malware and detection engineering.
Click the “ebpf” tag to see all relevant posts.
In the last few posts, we talked about a bpftrace and how attackers can use it to their advantage. This post is about my initial ideas and strategies to detecting malicious usage.
Detecting BPF misuseThere are a set of detection ideas for Blue Teams. Since we primarily talked about bpftrace so far, let’s explore that angle.