Skip to main content

An Introduction to Linux Kernel Backdoors

posted onNovember 7, 2004
by hitbsecnews

Today, most linux rootkits are implemented as kernel modules, and for good
reason. The kernel gives a programmer control over every aspect of the OS
and gives him/her control that makes it the logical target while developing
rootkits and backdoors.

In this article, I will briefly introduce some of the basic ideas in this
approach, mainly from the point of view of use in a honeypot.

The example has been tested with the 2.6.3 version of the linux kernel, and
may not work with the 2.4 series (as in, I haven't tested it with 2.4, so
you're on your own there). Please get back to me if you have any problems or
questions while using the example.

Source

Tags

Linux

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th