Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Linux Kernel Rootkit samples [closed]

I'm working on some new techniques for Linux Kernel Rootkit Detections as my thesis. I need some sample of rootkits to test my method and also do some machine learning tests. But not the old-dusty ones in packetstorm that could be found in computer history books as well. I've read alot about it and I've seen some new methods of rootkit implementations in phrack and some other resources. It would take a lot of time to just implement PoC rootkits out of them for me and I would just get to the starting point for my project by then.

If anyone could help me with this it would be greatly appreciated. Any site, ftp, compromised system, unknown rootkit libraries, anything that might be a sample for my work is appreciated. But with this in mind that what I need are Linux kernel Rootkits. Any type, LKM, System Call Hooking, Object hooking, system.map /dev/mem working stuff

Thanks

p.s by new rootkits I don't mean like non-reported or all-over-the-news rootkit, something that would work on ubuntu 10.04 or newer would be great (Kernel version 2.6.32+)

like image 614
Shayan Avatar asked Dec 19 '12 01:12

Shayan


People also ask

Can Linux get rootkits?

Linux rootkits have been evolving over the years to keep pace with detection mechanisms. For example, some of the earliest Linux rootkits weren't as much of a rootkit as they were just series of backdoored commands that would prevent a system administrator from detecting a malicious process, shell, file, etc.

What is kernel mode rootkits?

Rootkits that run in the kernel, also known as kernel-mode rootkits, can alter the entire operating system. Such modifications in the kernel aim to the concealment of the compromise. Therefore, the detection of a kernel rootkit becomes extremely hard. Different techniques exist to alter a system's kernel.

What does a rootkit do to a Linux OS?

Using the Linux Kernel Module, a rootkit can modify the kernel's syscall table. By doing this, the rootkit can replace a system call to point to a program of its own. Another technique that a rootkit can use is to delete a log entry on a system so there will be no log entry of the attackers' activities.

What is rootkit hooking?

User mode rootkits and DLL injection In Windows, API hooking is a technique that is commonly employed to modify or change the flow of API calls. A user mode rootkit exploits this technique to inject malicious code into a program's memory while remaining concealed.


2 Answers

For obvious reasons, you aren't going to find any rootkits available for download on the public internet. Doing so would be a huge liability exposure to anyone hosting them. Your options are: make some friends in the security research or black hat communities, or run some honeypots and capture them yourself.

like image 179
Andy Ross Avatar answered Sep 23 '22 02:09

Andy Ross


you can get some kernel rk from the follow link http://www.ussrback.com/UNIX/penetration/rootkits/

like image 41
jingchun.zhang Avatar answered Sep 23 '22 02:09

jingchun.zhang