You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Modern LKM rootkits use ftrace to hook syscalls.
Therefore, disabling ftrace early after UAC starts can be effective for collecting more accurate artifacts.
This can be done as follows:
echo 0 > /proc/sys/kernel/ftrace_enabled
or
sysctl kernel.ftrace_enabled=0
However, I have not been able to determine to what extent this might affect EDRs or other security features.
I believe it would be beneficial for UAC. What do you think?