Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Collect /proc/*/mounts #256

Closed
wants to merge 41 commits into from
Closed

Conversation

halpomeranz
Copy link
Contributor

Bind mounts can be used to hide processes (see https://dfir.ch/posts/slash-proc/). Add a new collector for /proc/*/mounts.

Herbert-Karl and others added 30 commits June 12, 2024 20:23
on system parsing of system accounting files
acct files use a custom format
usracct and savacct are berkeley database in format 1.85/1.86
Fixed "Find open files of (malicious) processes." in deleted.yaml
refactor: optimize hash collected code
update version
Birth time on FreeBSD 14 is shown as -1 in some cases, so this code fixes it to show 0 instead.
Code optimization changes only.
FreeBSD: information on jails (FreeBSD specific containers)
tclahr and others added 11 commits July 20, 2024 07:25
Update code to test whether zip can run in the target system before adding it to PATH.

zip binary was causing either a "segmentation fault" or a "kernel too old" in some specific systems making the output file creation to fail.

Fix tclahr#245
Add verbose message.
Bind mounts can be used to hide processes (see https://dfir.ch/posts/slash-proc/). One of the quickest ways to detect this behavior is to "grep /proc /proc/self/mounts". Because /proc/*/mounts are not necessarily the same across all processes, collect all of them.

Signed-off-by: Hal Pomeranz <hal@deer-run.com>
@halpomeranz halpomeranz deleted the proc-mounts branch July 23, 2024 15:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants