Tagged articles
8 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Apr 20, 2026 · Operations

How to Recover a Broken chmod Command After Setting Permissions to 000

When a mistaken chmod 000 renders the chmod binary unusable, this guide explains why the error occurs and walks through six practical recovery methods—including Perl, Python, scp, busybox, LD_PRELOAD, and LiveCD—plus preventive tips to avoid repeating the mistake.

BusyBoxLD_PRELOADLiveCD
0 likes · 7 min read
How to Recover a Broken chmod Command After Setting Permissions to 000
Deepin Linux
Deepin Linux
Jul 25, 2025 · Information Security

How to Hook Linux System Calls for Real‑Time Monitoring and Security

This article explains the concepts and implementation of Linux system‑call hooking, covering both user‑space techniques like LD_PRELOAD and kernel‑space methods such as inline patches and kprobes, and shows how to monitor, filter, and secure calls without breaking normal program flow.

HookLD_PRELOADSystem Call
0 likes · 36 min read
How to Hook Linux System Calls for Real‑Time Monitoring and Security
Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

Cron JobsForensicsLD_PRELOAD
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Mar 21, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: Step‑by‑Step Guide

This article walks through a real‑world Linux server breach, detailing the observed symptoms, investigative commands, hidden malicious scripts, file‑locking tricks, and a comprehensive remediation process that includes tightening security groups, strengthening passwords, monitoring critical files, and restoring compromised system utilities.

ForensicsLD_PRELOADSecurity
0 likes · 14 min read
How to Detect and Recover from a Linux Server Intrusion: Step‑by‑Step Guide
Open Source Linux
Open Source Linux
Jul 11, 2022 · Information Security

What Is Symbiote? Inside the New Highly Evasive Linux Rootkit

Researchers from Intezer and BlackBerry uncovered Symbiote, a novel Linux rootkit that loads as a shared library via LD_PRELOAD, hijacks libc and libpcap, uses BPF hooking to hide malicious traffic, and targets credential theft and remote access, especially in Latin American financial sectors.

BPFLD_PRELOADRootkit
0 likes · 5 min read
What Is Symbiote? Inside the New Highly Evasive Linux Rootkit
Efficient Ops
Efficient Ops
May 31, 2020 · Information Security

Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD

This article walks through a real‑world Linux mining malware incident, detailing how the attacker used a malicious crontab entry and LD_PRELOAD to hide processes, the forensic steps to uncover the payload, and practical remediation and hardening measures to prevent future compromises.

Cryptocurrency MiningLD_PRELOADLinux security
0 likes · 12 min read
Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD
ITPUB
ITPUB
Nov 1, 2016 · Information Security

How Linux Buffer Overflows Work and How to Defend Against Them

This article explains the mechanics of Linux buffer‑overflow attacks with concrete C and assembly examples, shows how to craft and execute shellcode, and demonstrates practical mitigation techniques such as using Libsafe with LD_PRELOAD to protect vulnerable programs.

LD_PRELOADLibsafeLinux security
0 likes · 23 min read
How Linux Buffer Overflows Work and How to Defend Against Them
ITPUB
ITPUB
Dec 30, 2015 · Information Security

Executing a Cold‑Boot Attack on LUKS‑Encrypted Linux Systems

This article explains how researchers built the EvilAbigail tool to perform a cold‑boot attack on Linux machines using LUKS full‑disk encryption, detailing the use of LD_PRELOAD bootkits, initrd manipulation, and password extraction techniques while also discussing practical mitigations.

LD_PRELOADLUKScold boot attack
0 likes · 10 min read
Executing a Cold‑Boot Attack on LUKS‑Encrypted Linux Systems