Esc
Kernel-based Process Isolation
Definition
Using kernel-level capabilities to isolate processes.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, .
Lateral Movement
Use Alternate Authentication Material
Discovery
System Owner/User Discovery
Persistence
Event Triggered Execution
Server Software Component
Scheduled Task/Job
Modify Authentication Process
Credential Access
Exploitation for Credential Access
OS Credential Dumping
Multi-Factor Authentication Request Generation
Modify Authentication Process
Defense Evasion
Use Alternate Authentication Material
Impair Defenses
Modify Authentication Process
References
All
Internet Article
The following references were used to develop the Kernel-based Process Isolation knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Overview of the seccomp sandbox
Reference Type: Internet Article