Our great sponsors
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
Perhaps a fun tool to get and use is tldr. It's an abridged version of the man pages. Example below:
Moreover, I see no need for an attacker to: - access to system processes: Why? The attacker should not waste their time doing that and instead just run: https://github.com/darkarp/chromepass - critical configuration such as firewall: This is only useful if the attacker wants to do something crazy to exfiltrate their data or setup another backdoor to maintain remote access for later. Both of these are usually unnecessary though as the attacker can simply setup ngrok (or something similar). - mounted drives: udisksctl is configured by default on almost every desktop Linux distro. And if the drive an attacker is not mounted, the attacker can simply run a daemon and wait until the user mounts it themselves.