Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 1)

1 · Dimitar Ganev · Oct. 2, 2022, 6:45 p.m.
Overview Recently I heard about a new malware called Symbiote, which the researches are calling the “Nearly-Impossible-to-Detect Linux Threat”. I was very intrigued by how that malware is being implemented and how it works internally to remain undetected, so naturally I’ve started to research it. I highly advise you to read through these articles first before we begin with the actual post: Hijack Execution Flow: Dynamic Linker Hijacking What Is the LD_PRELOAD? What is a Shared Library? Im...