I tried to trace web shell attack using Linux audit system. Following is the rule I appended.
-a exit,always -F arch=b64 -F gid=nginx -S execve
(using nginx)
With this setting, I can trace commands not 'pwd', but 'ls', 'cat'.
What are differences those had? And how can I trace all commands thoroughly?