Questions tagged [process]
76 questions
18
votes
4 answers
How to find processes that are hidden from task manager
I have read that you can hide processes from the task manager, example here
I've seen a few posts on hidden keyloggers using rootkit but that's it really.
Is there a tool or way to look at processes being run even though they have been hidden?
Arlix
- 1,459
- 3
- 13
- 22
15
votes
2 answers
Are there any architectures currently out there that use hardware-enforced process isolation? What would it take to add that to x86?
First-time asker/commenter, long-time reader.
As someone who's currently doing a lot of thinking & writing about measures that might foundationally improve computer security (ie., involving not just the kind of evolutionary, fairly modest steps that…
halfinformed
- 153
- 4
8
votes
1 answer
Do command substitution and piping prevent prying eyes from seeing hashed password being passed from process A to B?
This is loosely related to one of my recent answers. I've listed 4 methods of adding a new user via mkpasswd and useradd combination on Ubuntu 16.04.
Command substitution:
sudo -p ">" useradd -m -s /bin/bash -p $(mkpasswd --hash=SHA-512 "123" )…
Sergiy Kolodyazhnyy
- 519
- 5
- 17
6
votes
2 answers
How to handle decomissioned/donated/RMAed printers?
Printers, nowadays, almost always include some form of non-volatile storage that keep tracks of pretty much everything that went through the device.
In the case of larger, "departmental" system that often combine print/scan/fax functionality, that…
Stephane
- 18,557
- 3
- 61
- 70
6
votes
2 answers
Is there a way to check for "hollow" processes, or malware hidden within "normal" processes
I recently came across an article on the The Verge, which centers around the concept of commercial malware production and how it's used around the world. The article introduced me to a number of interesting (and worrisome) concepts such as "process…
posdef
- 161
- 3
6
votes
2 answers
Securing a process from local users
We require a method to run a process on a users machine whereby a local user cannot kill this process (from task manager or otherwise). Is there a way to make this application a system process or make it un-killable.
I have gone through all the…
Sachin Aggarwal
- 161
- 3
6
votes
3 answers
Secure TCP traffic for inter process communication
I have several processes running on a system that interact with each other by TCP (eg. with the asynchronous messaging protocol by twisted).
process1 <=====> broker <=====> process2
There is one server instance (broker) running on a linux host,…
Ovomaltine
- 63
- 1
- 4
6
votes
1 answer
How exactly do "hidden" processes work
How can a process be hidden inside another one?
Is the process moved into another process and turned into a thread with it's own run loop?
How exactly does a process get moved? I see this Metasploit command, migrate PID which seems to do this.
I…
some_id
- 385
- 2
- 14
5
votes
1 answer
How do Software Development Processes, OWASP CLASP & MS SDL, and Security Standards fit together?
How do these three concepts fit together:
The Software Development Process (SDP) indicates the different phases of creating an application. Well known processes are waterfall, spiral, agile, extreme programming, etc.
OWASP Clasp and Microsoft SDL…
daniel f.
- 281
- 1
- 6
5
votes
4 answers
What is the most secure way of transferring a secret between 2 processes running on the same system?
As a part of my system, I have many processes, each of them created through a script. One of the processes can be considered as a "Master Process" in the sense that this process communicates with the Server and gets all configuration and key related…
Jay
- 525
- 6
- 15
5
votes
2 answers
Is it possible for unprivileged user to modify/inject into other user's (root) process?
Although I'm not any kind of kernel specialist and I do not program in languages like C/C++ and thus I do not have deep understanding of critical concepts of managing processes at OS level I do have feeling that processes / daemons / socket…
Miloš Đakonović
- 153
- 6
5
votes
1 answer
What remote forensic technique could be used to discover a malware running via process injection
A piece of malware is running on a Windows 7 machine via process injection, so it does not show up in a process list. What remote forensic technique could be used to discover the malware is running under the contents of a specific process?
Whatever you want
- 59
- 1
- 2
4
votes
1 answer
How to determine which program accessed the Mac Camera?
The green light on my laptop's camera just flashed on and then off after 1 second. I am extremely concerned about this since I am not running any programs which could have enabled the camera.
I checked Console.app and found only…
Kevin Burke
- 96
- 1
- 2
- 10
4
votes
4 answers
Identify Malicious/Suscipicous Processes from Process List
I have a list of 1000 processes and I want to identify which of them are legitimate and which are not. I only have the name of the processes and I want to categorize them. Is there any way to get information of those processes programmatically?
If…
rise of a phoenix
- 53
- 1
- 1
- 6
4
votes
1 answer
Privileges separation over parent/children processes on UNIX systems?
I was scrolling through a Google Research paper related to privileges separation and I felt lost while reading this :
In Unix, every process runs within its own protection domain, i.e.,
the operating system protects the address space of a…
Shruikan
- 53
- 5