Unix Shell Configuration Modification
Adversaries may establish persistence through executing malicious commands triggered by a user’s shell. User [Unix Shell](https://attack.mitre.org/techniques/T1059/004)s execute several configuration scripts at different points throughout the session based on events. For example, when a user opens a command-line interface or remotely logs in (such as via SSH) a login shell is initiated. The login shell executes scripts from the system (<code>/etc</code>) and the user’s home directory (<code>~/</...
BY SOURCE
PROCEDURES (11)
Auto-extracted: 2 detections for container
Auto-extracted: 2 detections for c2
Auto-extracted: 2 detections for authentication monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for file monitoring
Auto-extracted: 1 detections for child process
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for privilege