IDS mailing list archives
Re: RootKits Under Linux
From: "John Geddes" <jgeddes1 () umbc edu>
Date: Fri, 1 Feb 2008 18:42:59 -0500
The majority of Linux rootkits check /dev/kmem for the address of the interrupt descriptor table (IDT). This is a table for all the system calls and their corresponding function pointers. Once you have this, you can just overwrite the function pointer for any system call to your own function. So for example you can write you own function for getdents with is used to get file listings and hide files. Here are some links with more information: http://www.phrack.org/archives/59/p59-0x13 http://www.phrack.org/archives/63/p63-0x07_Games_With_Kernel_Memory_FreeBSD_Style.txt http://reactor-core.org/linux-kernel-hacking.html So what a lot of rootkit detectors do is just check the IDT for inconsistencies. You can also compare the output to getdents (or just ls) to a lower level function call that gets the directory listing. If there are any differences there's a pretty good chance some file is being hidden. Hopes this helps. ~John Geddes On Feb 1, 2008 4:56 PM, Brandon Louder <Brandon.Louder () mckennan org> wrote:
I can't answer your entire question but I can provide a good resource. http://www.packetstormsecurity.org/UNIX/penetration/rootkits/ Packet Storm has A LOT of known rootkits listed there with descriptions and links to other sites. Another tool you might look into is Rootkit Hunter (rkhunter). Good Luck! -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Ahmed Zaki Sent: Thursday, January 31, 2008 1:41 PM To: focus-ids () securityfocus com Subject: RootKits Under Linux Hi all I am currently doing a project on rootkits under linux os. I am specially interested in loadable kernel module rootkits. I wanted to know where does research stand now in terms of detecting such rootkits. It would be very helpful if you would be able to point me to resources where I gain information on the diverse variations of these rootkits and current available methods of detecting them. Also if there are mechanisms that can be used to totally avoid detection that would be used by rootkits. Regards Zeeq ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaig n=intro_sfw to learn more. ------------------------------------------------------------------------ ----------------------------------------- Confidentiality Notice: This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
Current thread:
- RootKits Under Linux Ahmed Zaki (Feb 01)
- RE: RootKits Under Linux Brandon Louder (Feb 01)
- Re: RootKits Under Linux Nathan Sportsman (Feb 04)
- Re: RootKits Under Linux John Geddes (Feb 04)
- Re: RootKits Under Linux Johnny Wong (Feb 04)
- Re: RootKits Under Linux Hamilton Vera (Feb 04)
- RE: RootKits Under Linux Brandon Louder (Feb 01)