- Apr 26, 2011
- 2,779
There are several methods to detect rootkits, all of which can be circumvented if the rootkit itself is aware of the trick. Patched memory can be detected by reading the call tables or functions and checking their values. Instructions can be counted during runtime and compared with a baseline. Any sort of behavior changes can, in theory, be detected. The key weakness is when the code that performs this sort of check lives on the same machine that performs the check. And interesting trick to detect a rootkit is discussed in Phrack Magazine, Issue 59, Article 10, "Execution Path Analysis: Finding Kernel Based Rootkits" by Jan K. Rutkowski. A tool to detect rootkits in the Solaris kernel can be downloaded from http://www.immunitysec.com.
The ultimate end to most software exploits involves the installation of a rootkit. Rootkits provide a way for attackers to return at will to machines that they "own". Thus rootkits, like the one we discuss in this chapter, are extremely powerful. Ultimately, rootkits can be used to control every aspect of a machine. They do this by installing themselves deep in the heart of a system.
Rootkits may be run locally ofr they may arrive via some other vector like a worm or a virus. Like other kinds of malicious code, rootkits thrive on using hooks, trampolines, and patches to get their work done.
Excerpt from: "Exploiting Software, How to Break Code"
The ultimate end to most software exploits involves the installation of a rootkit. Rootkits provide a way for attackers to return at will to machines that they "own". Thus rootkits, like the one we discuss in this chapter, are extremely powerful. Ultimately, rootkits can be used to control every aspect of a machine. They do this by installing themselves deep in the heart of a system.
Rootkits may be run locally ofr they may arrive via some other vector like a worm or a virus. Like other kinds of malicious code, rootkits thrive on using hooks, trampolines, and patches to get their work done.
Excerpt from: "Exploiting Software, How to Break Code"