Six Malicious Linux Shell Scripts Used to Evade Defenses and How to Stop Them
Evasive techniques used by attackers have evolved to include Linux shell script tactics and techniques aimed at disabling firewalls, monitoring agents, and modifying access control lists (ACLs).