π£ Fileless Attacks in Linux β Execute Directly
In Linux, because of the magic of pipes (|
), you can execute scripts without saving them to disk first! π± This is called a fileless attack β and it's super sneaky. π
π Note: Some techniques (like using
mkfifo
) might still touch the disk temporarily. But piping directly into an interpreter (likebash
orpython3
) is often fileless in practice.
π Fileless Execution with curl
curl
Letβs take our old friend curl
and run a script straight from the web π
What this does:
Downloads the LinEnum.sh script from GitHub
Instead of saving it, it pipes it directly into
bash
for execution
π΅οΈββοΈ No file written. No trace left (unless someoneβs logging stdout)!
π§² Fileless Execution with wget
wget
Hereβs the same idea, but using wget
with a little trick using -qO-
:
π Output:
π Whatβs happening here:
-q
= quiet mode (no download info clutter)-O-
= send output to stdout instead of saving to a file| python3
= pipe that script straight into the Python interpreter π
β οΈ Why This Matters (and Why It's Dangerous)
Fileless attacks are a red flag for incident responders π¨ because:
No files = harder to detect
No disk artifacts = bypass some traditional AV/EDR solutions
Great for in-memory execution or living-off-the-land (LOLBin) tactics
Last updated