Offensive BPF! Getting started.
infonews
security
Source: Embrace The RedSeptember 30, 2021
Summary
eBPF (extended Berkeley Packet Filtering, a technology that lets users run small programs inside the Linux kernel without modifying kernel source code) is gaining attention for offensive security uses because it can hook into system calls, manipulate data, and even run on network hardware. The article introduces eBPF's structure (programs, maps, and events) and explains how attackers could potentially exploit its flexibility and power to hook into system functions, modify data, and spawn processes.
Classification
Attack SophisticationModerate
Original source: https://embracethered.com/blog/posts/2021/offensive-bpf/
First tracked: February 12, 2026 at 02:20 PM
Classified by LLM (prompt v3) · confidence: 95%