[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <423B3ADA.5030607@pwarchitects.com>
From: dk at pwarchitects.com (dk)
Subject: Microsoft GhostBuster Opinions
Ron DuFresne wrote:
> If the kernel is modified, on a windows or *nix system, you are going to
> have a clear clue upfront; the system will have rebooted. Course, a
That's a dangerous position to believe, at least with the linux kernel
(man insmod). Aside from just loading a kernel module that wraps system
calls, one has been able to directly modify kernel memory for years,
even without kernel bugs. Hence the utility of PaX, grsec, etc, etc.
In fact a few popular RK's do just his via /dev/kmem (bypassing module
loading) and the like do they not? (like suckit??)
Further research might be in order. ;-)
http://www.l0t3k.org/biblio/kernel/english/runtime-kernel-kmem-patching.txt
http://www.phrack.org/show.php?p=58&a=7
http://www.l0t3k.org/security/docs/rootkit/
...
--
dk
Powered by blists - more mailing lists