Further reading
- Exploring the
/proc
filesystem: https://www.tecmint.com/exploring-proc-file-system-in-linux/ - Linux kernel security subsystem wiki: https://kernsec.org/wiki/index.php/Main_Page
- Linux Magic System Request Key Hacks: https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html
- Linux to get kernel “lockdown” feature: https://www.zdnet.com/article/linux-to-get-kernel-lockdown-feature/
- Protect hard and symbolic links in RHEL/CentOS: https://www.tecmint.com/protect-hard-and-symbolic-links-in-centos-rhel/
- Log suspicious Martian packets: https://www.cyberciti.biz/faq/linux-log-suspicious-martian-packets-un-routable-source-addresses/
- Protect against the usage of ptrace: https://linux-audit.com/protect-ptrace-processes-kernel-yama-ptrace_scope/
- Introduction to Linux Control Groups (cgroups) Version 1: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/resource_management_guide/chap-introduction_to_control_groups...