Skip to content

Conversation

@halpomeranz
Copy link
Contributor

/boot can contain attacker persistence mechanisms (see https://www.elastic.co/security-labs/the-grand-finale-on-linux-persistence). Also, stripped kernels can now be used to generate Volatility 3 profiles with btf2json (https://www.iblue.team/memory-forensics-1/volatility-plugins/generate-custom-profile-using-btf2json), making /boot/vmlinu* very useful when memory is also being collected.

/boot can contain attacker persistence mechanisms (see https://www.elastic.co/security-labs/the-grand-finale-on-linux-persistence). Also, stripped kernels can now be used to generate Volatility 3 profiles with btf2json (https://www.iblue.team/memory-forensics-1/volatility-plugins/generate-custom-profile-using-btf2json), making /boot/vmlinu* very useful when memory is also being collected.

Signed-off-by: Hal Pomeranz <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant