Processes states in unix linux

broken image
broken image

It can also be used to identify legitimate processes that are behaving unexpectedly or maliciously, by looking for the process name and the command line arguments used to launch the process. , such as evil.bin or, that are commonly used by malware.

broken image

For example, a name fingerprinting tool might look for specific file names

broken image

Name fingerprinting is often used to identify known malicious or unwanted processes by comparing their names to a database of known names or patterns. This information could include the process’s file name, file path, command line arguments, and other identifying indicators of compromise On a computer system by using the process name or other identifiable information. This is how you could imagine fingerprinting process treesįorensics technique used to identify and track processes running

broken image