Full Disclosure mailing list archives

RE: Microsoft GhostBuster Opinions


From: "Todd Towles" <toddtowles () brookshires com>
Date: Fri, 18 Mar 2005 09:48:54 -0600

 
Dave wrote:

    About Tripwire, I understand what it does.  It basically 
runs a file integrity check on certain files and reports the 
differences from the last (hopefully known good) scan.  Say 
that Tripwire is running on a system that's been compromised 
by a rootkit that's been designed to evade file integrity 
checkers such as tripwire.  Since the rootkit has control of 
the kernel it has control of all the low level functions, 
like returning a file when asked for one.  So one way to 
evade tripwire would be to return the real file when asked 
for it in read-only mode and return the rootkit file when 
asked for it in execution mode.  That way tripwire won't 
think the file has changed, since it's being given the same 
file as it checked before, but when the file is executed then 
it's the malicious file.

But could this not be bypassed by running Tripwire from a bootable CD?
The modified keneral would be inactive and therefore you would see the
two separate files are opposed to just one. This is the idea that this
new Microsoft products uses, but as people have stated, this can be done
now with a combination of open-source products.

-Todd
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://www.secunia.com/


Current thread: