logoalt Hacker News

jeffbeetoday at 2:15 PM3 repliesview on HN

Based on what? Proc title?


Replies

CGamesPlaytoday at 2:19 PM

Proc title is very easily forged (without root even). Obviously a real privileged process could modify the kernel and do whatever it wants, but if I were trying to detect this I would start with /proc/$id/exe.

show 2 replies
dborehamtoday at 2:38 PM

They might just compute a hash over the binary, or the code space in memory.

parliament32today at 2:23 PM

It's curious they're just "monitoring" rather than preventing.

In a serious environment you'd run IPE with dm-verity/fs-verity to ensure binaries are whitelisted and integrity-checked at every execution.

show 1 reply