LogoLogo
CtrlK
DiscordLinkedInPricingGarnet🐈‍⬛
  • Information
    • Welcome
    • Jibril Runtime Security
    • Why Jibril ?
      • New Paradigm
      • Architecture
      • Security Model
  • Installation
    • Requirements
    • Install Methods
      • Systemd Service
        • Systemd Config
      • Command Line
      • Docker Container
    • Kubernetes
      • Automation Script
      • Script Usage
      • Helm Chart
    • Configuration File
      • Cache Configuration
      • Cadence Configuration
      • Network Policy File
  • Execution
    • Components
    • Network Policy
    • Mechanisms
      • File Access
      • Execution
      • File Access And Execution
      • Network Peers
      • Network eBPF Logic
      • Probes and Traces
      • Bigger eBPF Logic
      • Loader Interception
    • Detections
      • File Access
        • Auth Logs Tamper
        • Binary Self Deletion
        • Capabilities Modification
        • Code Modification Through Procfs
        • Core Pattern Access
        • CPU Fingerprint
        • Credentials Files Access
        • Crypto Miner Files
        • Environment Read From ProcFS
        • File Example
        • Filesystem Fingerprint
        • Global Shlib Modification
        • Java Debug Lib Load
        • Java Instrument Lib Load
        • Machine Fingerprint
        • OS Fingerprint
        • OS Network Fingerprint
        • OS Status Fingerprint
        • Package Repo Config Modification
        • PAM Config Modification
        • Reading Of SSH Keys
        • Sched Debug Access
        • Shell Config Modification
        • SSH Auth Keys Modification
        • SSL Certificate Access
        • Sudoers Modification
        • Sysrq Access
        • Unprivileged Bpf Config Access
      • Execution
        • Binary Executed By Loader
        • Code On The Fly
        • Credentials Text Lookup
        • Crypto Miner Execution
        • Data Encoder Exec
        • Denial Of Service Tools
        • Exec Example
        • Exec From Unusual Dir
        • File Attribute Change
        • Hidden Elf Exec
        • Interpreter Shell Spawn
        • Password Brute Force
        • Net Filecopy Tool Exec
        • Net MitM Tool Exec
        • Net Scan Tool Exec
        • Net Sniff Tool Exec
        • Net Suspicious Tool Exec
        • Net Suspicious Tool Shell
        • Passwd Usage
        • Runc Suspicious Exec
        • Webserver Exec
        • Webserver Shell Exec
      • Network Peers
        • Adult Domain Access
        • Algorithmic Domains
        • Badware Domain Access
        • Cloud Metadata Access
        • Dynamic DNS Domain Access
        • Fake Domain Access
        • Gambling Domain Access
        • General New Domains
        • Phishing Domains
        • Peer Example
        • Piracy Domain Access
        • Plaintext Communication
        • Threat Domain Access
        • Tracking Domain Access
        • VPN Domain Access
  • Customization
    • The Attenuator
    • Alchemies
      • Overview
      • Enable Alchemies
      • Create Recipes
      • Recipes Reference
      • Builtin Recipes
    • Reactions
      • Overview
      • Configuration
      • Troubleshooting
      • Performance
      • Security
      • JavaScript API
      • Examples
      • Best Practices
  • Posts
    • Jibril Runtime Security
    • Jibril v2.4: Detect & React
  • Support
    • License
    • Bugs and Requests
Powered by GitBook
On this page

Was this helpful?

  1. Execution
  2. Detections

Network Peers

Adult Domain AccessAlgorithmic DomainsBadware Domain AccessCloud Metadata AccessDynamic DNS Domain AccessFake Domain AccessGambling Domain AccessGeneral New DomainsPhishing DomainsPeer ExamplePiracy Domain AccessPlaintext CommunicationThreat Domain AccessTracking Domain AccessVPN Domain Access
PreviousWebserver Shell ExecNextAdult Domain Access

Last updated 5 months ago

Was this helpful?