This work has focused on analyzing and investigating the Linux Kernel, with the aim of identifying ways to detect access to the system, making it difficult to identify during a real situation.
Techniques for privileges escalation have been studied in depth, and the deployment of backdoors to allow from continuing to access a system once it has been compromised. In addition, hooking techniques have been investigated,
which hide the actions that are being carried out and with which they have access to the system.