Hiding in plain sight: Modifying process names in Unix-like systems
> it is actually possible for a running process to change the symbolic link to exe
> requires munmap'ing pages of memory marked as executable and then invoking specific system calls in order to bypass some protections
> will describe how with sample code in a subsequent post on this site
I'm really curious now. Does anyone here know anything about this?
This is a real Linux hacker article. I use lxc and now I know how they changed the process names. Thanks.
### pseudo ### a couple days ago hiding irc ddos perl bot process was required modified string length only in a simple way like a >"/usr/local/apache/bin/httpd -DSSL" . " " x 100 which has allowed critical info to be displayed(?) out of visible tty/stdout