System Binary Proxy Execution (T0894)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • System Binary Proxy Execution

Associated Tactics

  • Evasion

Evasion (TA0103)

The adversary is trying to avoid security defenses. Evasion consists of techniques that adversaries use to avoid technical defenses throughout their campaign. Techniques used for evasion include removal of indicators of compromise, spoofing communications, and exploiting software vulnerabilities. Adversaries may also leverage and abuse trusted devices and processes to hide their activity, possibly by masquerading as master devices or native software. Methods of defense evasion for this purpose are often more passive in nature.

View on ATT&CK

Procedure Examples

Description Source(s)
GTFOBins. (2020, November 13). split. Retrieved April 18, 2022. GTFO split
Oddvar Moe et al. (2022, February). Living Off The Land Binaries, Scripts and Libraries. Retrieved March 7, 2022. LOLBAS Project
Torbjorn Granlund, Richard M. Stallman. (2020, March null). split(1) — Linux manual page. Retrieved March 25, 2022. split man page