Download presentation
Presentation is loading. Please wait.
Published byFrederick Houston Modified over 9 years ago
1
How an attacker can maintain control over their victim’s system without being discovered.
2
A rootkit is a collection of tools used by intruders to keep the legitimate users and administrators of a compromised machine unaware of their presence[1]. The keyword to remember for a rootkit is undetectable; and the most common purposes for a rootkit are sustained access and eavesdropping.
3
Early 1990’s – Internet becomes popular 1 st Generation rootkits- Replaced potential tattletale binaries (e.g. netstat, ls) Easy to detect- Compare the hashes of the original binary with current one. First rootkits were mostly written for Unix based systems (hence rootkit, instead of Administratorkit) 1999- NTRootkit, an early Windows rootkit Rootkits did not really become part of security admin vernacular until mid 2000’s Kicked off an arms race- rootkit developers vs detection/prevention measures
4
Processes Files Network Connections Also: Various system statistics (e.g. CPU percentage)
5
Uh oh, you have a rootkit?
6
Zen quote
7
Proof of concept The Hello World of Rootkits
9
Hooking- Overwriting target function to act in favor of the rootkit Example 1- Overwrite legitimate function in memory Example 2- Overwrite legitimate function’s address in IAT to point to rootkit’s custom function instead
10
Similar concept, but different memory spaces, tables, functions…
12
Detecting a Presence Guard the Doors- Think intrusion detection Roaming Guard- Periodic System scans Detecting Behavior Sysinternals RootkitRevealer example Live Detections- Rootkit revealer GMER- Free, GNU-based. Helios- Behavioral analysis (can be used to detect many forms of malware) Sophos Anti-Rootkit- Free. Scans other forms of malware. Can scan a network, not just a single host. If kernel rootkit is suspected- Need to analyze system under a kernel debugger (kd.exe)
13
Still need to nuke system from orbit Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.