Weaponizing UNIX Shell Scripts by Cyber Adversaries and Mitigation Mechanisms: A Comprehensive Review

Authors

  • Manas Kumar Yogi
  • Yamuna Mundru

Abstract

The Unix-programming local area generally utilizes shell scripts as a straightforward method for executing numerous Linux orders inside a solitary record. Numerous clients do this as a component of an ordinary functional responsibility controlling documents, executing projects, and printing text. Nonetheless, as a shell translator is accessible in each UNIX machine, it is additionally an intriguing and dynamic device manhandled by pernicious entertainers. We have recently expounded on payloads conveyed through shell contents to manhandle misconfigured Redis examples, uncover Docker APIs, or eliminate rival cryptographic money excavators. Here, we observe the manners in which shell scripts have changed in the possession of cybercriminals, and how it very well may be utilized in the improvement of malware payloads in noxious schedules. In this study, the number of attacks carried out by adversaries with Unix scripts are presented and we also discuss the various mitigation mechanisms to face the challenge.

Published

2022-06-13