Learn how to use dpkg, rpm, and other related tools to find malware on your systems.
Why do this? After playing the Pros versus Joes CTF on multiple occasions, a common tactic employed by the red team is to add malicious entries to bashrc, profile, and such. This is a common and documented persistence technique: https://attack.mitre.org/techniques/T1156/ Bash and other shells can be used to create sockets if they are configured/compiled to …
Quick howto on changing apt/apt-get's User-Agent string.
Apparently, sshuttle requires the "netstat" command to function.