linux-rootkit

Feature-rich interactive rootkit that targets Linux kernel 4.19, accompanied by a dynamic kernel memory analysis GDB plugin for in vivo introspection (e.g. using QEMU)
git clone git://git.deurzen.net/linux-rootkit
Log | Files | Refs

commit 0fc0cd327a3c1e1367e2ddf6890c47cf1ebd2892
parent b55c4ff0a3eebb6d4759d722e2bbdfba51b81e85
Author: Tizian Leonhardt <tizianleonhardt@web.de>
Date:   Mon,  8 Feb 2021 09:39:52 +0100

Add exemplary outputs for demos

Diffstat:
Mproject/slides/presentation.tex | 23+++++++++++++++++++++--
1 file changed, 21 insertions(+), 2 deletions(-)

diff --git a/project/slides/presentation.tex b/project/slides/presentation.tex @@ -361,15 +361,34 @@ \begin{frame}[fragile]{\insertsection} \framesubtitle{Demo 1 - Allocation \& Deallocation} \begin{itemize} - \item We will demonstrate the output in a running system now + \item We will demonstrate the output in a running system now: \end{itemize} + \begin{lstlisting} + Allocating ('type = struct elf64_phdr *', 616, './fs/binfmt_elf.c:441') at 0xffff8d96b8857000 + Allocating ('type = char *', 28, './fs/binfmt_elf.c:762') at 0xffff8d96ba5d98e0 + Allocating ('type = struct elf64_phdr *', 504, './fs/binfmt_elf.c:441') at 0xffff8d96bb4b1e00 + Allocating ('type = void *', 168, './block/bio.c:452') at 0xffff8d96ba14bcc0 + + \end{lstlisting} + \end{frame} \begin{frame}[fragile]{\insertsection} \framesubtitle{Demo 2 - Rootkit Detection} \begin{itemize} - \item We will demonstrate the output in a running system now + \item We will demonstrate the rootkit detection in a running system now: \end{itemize} + \begin{lstlisting} + //inside the vm, rootkit is loaded + > make_me_root + \end{lstlisting} + \begin{lstlisting} + ((((struct task_struct *)0xffff8d96bb6849c0)->real_cred)->uid) changed from val = 1000 to val = 0 + WARNING: critical value 0 set to ((((struct task_struct *)0xffff8d96bb6849c0)->real_cred)->uid) + + \end{lstlisting} + + \end{frame} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%