Research Update Enhanced src/generic-methodologies-and-resou...#2060
Merged
carlospolop merged 1 commit intomasterfrom Mar 27, 2026
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: Content Categories: Based on the analysis, this content was categorized under "Research". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Research Update for src/generic-methodologies-and-resources/basic-forensic-methodology/file-integrity-monitoring.md
This PR contains automated research updates including:
Generated by: HackTricks Research Agent
Timestamp: 2026-03-27 13:27:05 UTC
Tool usage
🔧 Technical Details
Research update for HackTricks content
🤖 Agent Actions
I’m reading the current page and the nearby forensic content first, then I’ll branch into recent research so the additions stay specific and don’t duplicate existing HackTricks material.
The current page is extremely thin, so I’m checking adjacent forensic and anti-forensic pages to keep this one focused on FIM-specific attacker tradecraft rather than generic host forensics.
Search is surfacing two useful directions: newer Linux backends beyond plain
inotify, and attacker anti-forensics that bypass or race FIM coverage. I’m validating both with primary docs and a few concrete research posts before writing.I have enough structure now: the page can be upgraded with concrete backend choices, operational blind spots, and short, copy-pastable examples. I’m pulling a few final details from vendor docs so the commands and caveats are exact.
I’ve narrowed the additions to what materially improves this page: actionable backend choices, known collection gaps, container and Windows specifics, and short setup examples. I’m writing those changes into the target file now and then I’ll verify the diff.
Updated file-integrity-monitoring.md with a much more practical FIM page. I expanded the baseline section to cover metadata beyond hashes, added Linux backend tradeoffs (
inotify,auditd,eBPF/kprobes), documented common blind spots like atomic file replacement and watch exhaustion, added a short AIDE workflow and anosqueryexample, covered Windows USN Journal plus Sysmon Event IDs 11/2/15, and added a brief containeroverlay2note so the page reflects where writes actually land.I kept the page focused on attacker-relevant hunting and avoided duplicating the broader anti-forensics page by linking to it for ADS, timestomping, and USN tampering. I also replaced the weak generic references with two stronger references at the end and verified the final diff.
Research URLs used:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.