Evasive Techniques Used By Malicious Linux Shell Scripts

Learn about common defense evasion techniques used in malicious shell scripts and how Uptycs detects them.

Attackers use malicious shell scripts as an initial vector to download malicious payloads to the victim system. In the earlier days, base64 and other common encoding schemes were used to evade defensive parameters. But nowadays, threat actors are adopting newer techniques that include commands to disable firewalls, monitoring agents etc.