Imperius - Make An Linux Kernel Rootkit Visible Again
2024-9-18 19:30:0 Author: www.kitploit.com(查看原文) 阅读量:12 收藏

A make an LKM rootkit visible again.

It involves getting the memory address of a rootkit's "show_module" function, for example, and using that to call it, adding it back to lsmod, making it possible to remove an LKM rootkit.

We can obtain the function address in very simple kernels using /sys/kernel/tracing/available_filter_functions_addrs, however, it is only available from kernel 6.5x onwards.

An alternative to this is to scan the kernel memory, and later add it to lsmod again, so it can be removed.

So in summary, this LKM abuses the function of lkm rootkits that have the functionality to become visible again.

OBS: There is another trick of removing/defusing a LKM rootkit, but it will be in the research that will be launched.

Imperius - Make An Linux Kernel Rootkit Visible Again Imperius - Make An Linux Kernel Rootkit Visible Again Reviewed by Zion3R on 8:30 AM Rating: 5


文章来源: http://www.kitploit.com/2024/09/imperius-make-linux-kernel-rootkit.html
如有侵权请联系:admin#unsafe.sh