At (Linux) (T1053.001)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution
  • Persistence
  • Privilege Escalation

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021. rowland linux at 2019
Emilio Pinna, Andrea Cardaci. (n.d.). gtfobins at. Retrieved September 28, 2021. GTFObins at
Koromicha. (2019, September 7). Scheduling tasks using at command in Linux. Retrieved December 3, 2019. Kifarunix - Task Scheduling in Linux