Kernel viruses/rootkits are dificult to detect, but admins change the kernel frequently and the attacker loose the rootkit.
People infect user-space, and pre-root attacks are also in user-space, then a system to log user-space dangerous activities will be very useful.
A year ago I coded a defense system that is now public.
Is simple but useful, I hook open, socketcall, execve and unlink, for example if your "ls" is connecting to internet you will see:
Dec 1 13:44:51 hostname kernel: ls CONNECT(80.33.158.80:1337 fam:2)
If your ls Opening for writting:
Dec 1 13:44:25 pwn3d kernel: ls OPEN(/dev/.shm/.sniff w)
try the Defense System here
People infect user-space, and pre-root attacks are also in user-space, then a system to log user-space dangerous activities will be very useful.
A year ago I coded a defense system that is now public.
Is simple but useful, I hook open, socketcall, execve and unlink, for example if your "ls" is connecting to internet you will see:
Dec 1 13:44:51 hostname kernel: ls CONNECT(80.33.158.80:1337 fam:2)
If your ls Opening for writting:
Dec 1 13:44:25 pwn3d kernel: ls OPEN(/dev/.shm/.sniff w)
try the Defense System here
Comentarios
Sige en ello, bonito blog!
Saludos :)
salu2
Un saludito y feliz navidad, jeje
Mas que nada, cuando tu "user space" hace cosas raras, con esto puedes ver bien k hace.
por ej k si de repente el firefox emite conexiones a una web concreta (virus javascript) o si tu cliente jabber empieza a borrar ficheros :) etc ..
Para cuando estas en modo paranoide, y ves bichos en todos los procesos :) va bien.
salu2