GNU/Linux ◆ foot ◆ bash 872 views

Hackers who gain code execution on a system (let’s say through an exploit) check in which user context they run, the privileges they have, and learn about the system. That would usually go unnoticed. Here I demonstrate how Auditd picks it up. Rules are gathered and published by Florian Roth ( Best Practice Auditd Configuration https://github.com/Neo23x0/auditd)