public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Kernel Rootkits
@ 2005-04-15 16:02 Allison
  2005-04-15 17:16 ` Richard B. Johnson
  0 siblings, 1 reply; 14+ messages in thread
From: Allison @ 2005-04-15 16:02 UTC (permalink / raw)
  To: linux-kernel

Hi,

I was curious about how kernel rootkits become a part of the kernel ?
One way I guess is by inserting a kernel module.  And rootkits also
manage to hide themselves from rootkit detectors.

few questions:
1. Are there any other ways by which rootkits become part of the kernel ?

2. If modules can access only exported symbols, how is it that kernel
rootkits manage to get hold of other information from the kernel ? For
ex, the process table.

I am not familiar with the /dev/kmem interface. Does this interface
let any kernel module read any symbol (even non-exported) from the
kernel ?

3. If I want to hide a function which is part of the kernel from
kernel modules, is this possible ideally ?

thanks,
Allison

^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: Kernel Rootkits
@ 2005-04-15 17:33 Malita, Florin
  2005-04-15 18:08 ` Lee Revell
  0 siblings, 1 reply; 14+ messages in thread
From: Malita, Florin @ 2005-04-15 17:33 UTC (permalink / raw)
  To: linux-os; +Cc: Allison, linux-kernel

On Fri, 2005-04-15 at 13:16 -0400, Richard B. Johnson wrote:
> I'm not sure there really are any "kernel" rootkits. You need to be 
> root to install a module and you need to be root to replace a kernel 
> with a new (possibly altered) one. If you are root, you don't 
> need an exploit.

rootkit != exploit

The exploit is used to gain root privileges while the rootkit is used
after that to install & hide backdoors, sniffers, keyloggers etc.

http://en.wikipedia.org/wiki/Rootkit


^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: Kernel Rootkits
@ 2005-04-15 18:15 Allison
  2005-04-15 18:34 ` Daniel Souza
                   ` (3 more replies)
  0 siblings, 4 replies; 14+ messages in thread
From: Allison @ 2005-04-15 18:15 UTC (permalink / raw)
  To: linux-kernel

hi,

I got the terminology mixed up. I guess what I really want to know is,
what are the different types of exploits by which rootkits
(specifically the ones that modify the kernel) can get installed on
your system.(other than buffer overflow and somebody stealing the root
password)

I know that SucKIT is a rootkit that gets loaded as a kernel module
and adds new system calls. Some other rootkits change machine
instructions in several kernel functions.

Once these are loaded into the kernel, is there no way the kernel
functions can be protected ?

thanks,
Allison

^ permalink raw reply	[flat|nested] 14+ messages in thread
* Re: Kernel Rootkits
@ 2005-04-15 19:15 Allison
  2005-04-15 19:38 ` Daniel Souza
  0 siblings, 1 reply; 14+ messages in thread
From: Allison @ 2005-04-15 19:15 UTC (permalink / raw)
  To: linux-kernel

Isn't the kernel code segment marked read-only ? How can the module
write into the function text in the kernel ? Shouldn't this cause some
kind of protection fault ?

thanks,
Allison

Lee Revell wrote:
> On Fri, 2005-04-15 at 18:15 +0000, Allison wrote:
> > Once these are loaded into the kernel, is there no way the kernel
> > functions can be protected ?
> 
> No.  If the attacker can load arbitrary code into the kernel, game over.
> Think about it.
> 
> Lee
> 
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2005-04-15 19:40 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-04-15 16:02 Kernel Rootkits Allison
2005-04-15 17:16 ` Richard B. Johnson
  -- strict thread matches above, loose matches on Subject: below --
2005-04-15 17:33 Malita, Florin
2005-04-15 18:08 ` Lee Revell
2005-04-15 18:15 Allison
2005-04-15 18:34 ` Daniel Souza
2005-04-15 18:36 ` Lee Revell
2005-04-15 18:37 ` Lennart Sorensen
2005-04-15 19:19   ` Andre Tomt
2005-04-15 18:40 ` Daniel Souza
2005-04-15 19:21   ` Lee Revell
2005-04-15 19:40     ` Daniel Souza
2005-04-15 19:15 Allison
2005-04-15 19:38 ` Daniel Souza

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox