Why bother with argv[0]?

The first argument of a program’s command line, typically reflecting the program’s name/path and often referred to as argv[0], can in most cases be set to an arbitrary value without affecting the process’ flow. Making the case against argv[0], this post demonstrates how it can be used to deceive security analysts, bypass detections and break defensive software, across all main operating systems.

Why bother with argv[0]?

The first argument of a program’s command line, typically reflecting the program’s name/path and often referred to as argv[0], can in most cases be set to an arbitrary value without affecting the process’ flow. Making the case against argv[0], this post demonstrates how it can be used to deceive security analysts, bypass detections and break defensive software, across all main operating systems.

CRYSTALRAY Cyber-Attacks Grow Tenfold Using OSS Tools - RedPacket Security

The Sysdig Threat Research Team (TRT) has revealed significant developments in the activities of the SSH-Snake threat actor. 

RedPacket Security
Cyber Risk Management | Cyber Security Cape Town | trg.co.za

TRG provides Cyber Risk Management & Cyber Security in Cape Town and through out South Africa and Africa. With Advanced Threat Detection and Monitoring technology ensuring your business remains secure from cyber attacks.

TRG
Cyber Risk Management | Cyber Security Cape Town | trg.co.za

TRG provides Cyber Risk Management & Cyber Security in Cape Town and through out South Africa and Africa. With Advanced Threat Detection and Monitoring technology ensuring your business remains secure from cyber attacks.

TRG