Network Instrumentation and TCP File Descriptor Hijacking

  • What's the performance hit for doing this? And, the rootkit question, how would eBPF notice you doing this?