Check out the new USENIX Web site.


LISA '05 Paper    [LISA '05 Technical Program]

Fast User-Mode Rootkit Scanner for the Enterprise

Yi-Min Wang and Doug Beck - Microsoft Research, Redmond

Pp. 23-30 of the Proceedings of LISA '05: Nineteenth Systems Administration Conference,
(San Diego, CA: USENIX Association, December, 2005).

Abstract

User-mode resource hiding through API interception and filtering is a well-known technique used by malware programs to achieve stealth. Although it is not as powerful as kernel-mode techniques, it is more portable and reliable and, as a result, widely used. In this paper, we describe the design and implementation of a fast scanner that uses a cross-view diff approach to detect all user-mode hiding Trojans and rootkits. We also present detection results from a large-scale enterprise deployment to demonstrate the effectiveness of the tool.

Introduction

The term "rootkit" generally refers to the class of stealth malware programs that hide "resources" from the operating system resource-enumeration APIs. For example, a rootkit may be used to hide critical executable files from anti-virus scanners, to hide critical Windows Registry entries from experienced system administrators using programs such as RegEdit, and to hide critical processes from average users running Windows Task Manager. By making critical resources "invisible" to the APIs and the system utilities that make use of such APIs, rootkits have a much better chance of evading detection and maintaining full control of infected machines for an extended period of time.

The techniques used by rootkits to achieve stealth can be broadly divided into two categories. Rootkits in the first category intercept resource-enumeration APIs in user mode or kernel mode, and remove selected entries before the results are returned to the API caller. Rootkits in the second category perform Direct Kernel Object Manipulation (DKOM) to remove selected resource entries from a cached list (such as the ActiveProcessList on Windows) that is designed specifically for answering resource queries and not critical to the actual functions of the resources or to the functioning of the operating system.

Cross-View Diff-Based Rootkit Detection

The traditional signature-based anti-virus approach cannot effectively deal with rootkit infections in the enterprise for three reasons. First, viruses usually have well-defined bundles and scope of impact, which can be analyzed in a lab to generate fixed signatures. In contrast, rootkits are merely "resource hiders" that can be used to hide any hacker tools, keyloggers, spyware programs, FTP servers, etc., so each rootkit infection can potentially involve a customized bundle with a different scope of impact.

Second, sophisticated hackers who attack large enterprise are less likely to use common tools or malware programs for which commercial anti-virus scanners already have signatures. Finally, while the major strength of anti-virus software is to detect and automatically remove known-bad malware programs without user intervention, corporate security organizations in large enterprises often need to investigate every rootkit infection case to assess potential damages and prevent future infections; automatic removal is often not desirable.

We previously proposed a non-signature, diff-based approach to rootkit detection, called GhostBuster [WVR+04]. The basic idea is to get "the lie" from inside the box, get "the truth" from outside the box, and take a diff to detect hidden resources. Specifically, we get "the lie" by enumerating files and Registry entries through infected APIs inside the operating system. Then we boot into a clean CD and scan the files and Registry on the infected drive as a data drive. Since the rootkit is not running, we obtain "the truth" that includes the resources that the rootkit was trying to hide so that the diff between "the lie" and "the truth" will reveal precisely those hidden entries. Such a diff-based approach essentially turns the hiding behavior into its own detection mechanism and turns one of the most difficult anti-malware problems into one of the easiest problems to solve.

Fast User-Mode Rootkit Scanner for the Enterprise

Although this CD-boot-based solution can cover a broad range of rootkits, no matter how they are operating in user mode or kernel mode, it is inconvenient, requires user cooperation, and is difficult to deploy on an enterprise scale as a scanner. Since the statistics from a major Product Support Service (PSS) organization indicates that user-mode rootkits account for over 90% of the reported enterprise rootkit cases, it is desirable to have a scalable rootkit scanner that can be deployed in the enterprise to detect all user-mode rootkits, which intercept and filter resource API calls in the address space of each user-mode process [YH03, YN04].

We have developed such a rootkit scanner for Windows platforms. It is based on the key observation that, when considering only user-mode rootkits, "the truth" can be obtained from the lowest level of user mode by properly preparing the call stack parameters and using a few lines of assembly code to directly invoke the transition into the kernel, without going through the regular user-mode Win32 API code. In our current implementation, we use the difference to detect hidden processes and to detect hidden hooks to Auto-Start Extensibility Points (ASEPs), which are those Registry locations most frequently attacked by spyware, Trojans, and rootkits based on an extensive study [WRV+04, WBV+05]. If any hidden processes or ASEP hooks are detected, we then look for potentially hidden files associated with those hidden entries. This allows us to detect user-mode rootkit infections in a few seconds, without requiring a reboot or any user participation.


(a)

(b)

Figure 1: Trojans and rootkits that (a) hide Registry entries and (b) hide processes.

Implementation

Figure 1 (a) and (b) illustrates how several real-world Trojans and rootkits hook into the Registry and process enumeration API calling chains, respectively, to hide their resources. Urbin and Mersting are Trojan DLLs that make modifications at the highest level by altering the per-process Import Address Table (IAT) entries of the Registry enumeration APIs to point to their Trojan functions (an IAT contains pointers to functions exported by loaded DLLs [HB05]). In contrast, Vanquish directly modifies the loaded, in-memory API code to interject its code. Both techniques cause the Trojan functions to appear in the call stack trace of a kernel or user-mode debugging session.

To achieve better stealth, Aphex and Hacker Defender modify the in-memory API code with a jump to the Trojan code along with a Trojan code jump back to the next instruction after the API detour [HB99]; the Trojan code modifies the return address on the stack to cause its code to be executed in the return path. The only difference is that Aphex modifies the RegEnumValue API code inside Apvapi32.dll (denoted by Advapi32!RegEnumValue), while Hacker Defender modifies the lower-level NtEnumerateKey API exported by NtDll.dll. YYT rootkit operates very similarly to Hacker Defender. ProBot SE in Figure 1(a) and FU in Figure 1(b) are kernel-mode stealth programs that cannot be detected by the scanner described in this paper.

Our tool performs the following steps to obtain "the truth" from underneath all the user-mode Trojans and rootkits shown in Figure 1.

  • Set up the user-mode stack with the parameters required by the operating system; this is easily achieved by creating a function with a signature that exactly matches the desired Native API, such as NtDll!NtEnumerateKey() and NtDll!Nt QuerySystemInformation();
  • Populate the EAX register with the index that indicates to the operating system which system function you wish to call;
  • Populate the EDX register with a pointer to the user mode's stack parameters;
  • Execute an "int 2e" instruction to signal a kernel-mode transition;
  • Return to the caller.

The previous steps basically describe what the code in NtDll.dll does when calling into the operating system. Given that the steps require direct manipulation of X86 registers, a portion of the code is written in assembly - this is easily obtained by disassembling NtDll.dll and searching for the desired function by name. Below is an example of the NtQuerySystemInformation call for retrieving "the truth" of the list of processes:

__declspec(naked)
NTSTATUS
NTAPI
MyNtQuerySystemInformation(
   SYSTEM_INFORMATION_CLASS
                 SystemInformationClass,
   PVOID SystemInformation,
   ULONG SystemInformationLength,
   PULONG ReturnLength)
{
    __asm
    {
          mov eax, 0xAD
          lea edx, [esp+0x4]
          int 2eh
          ret 10h
    }
}

Rootkits & TrojansHidden ASEP Hooks Detected
Urbin HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\ AppInit_DLLs > msvsres.dll
Mersting HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\ AppInit_DLLs > kbddfl.dll
YYT Rootkit HKLM\SYSTEM\CurrentControlSet\Services\NPF > npf.sys
HKLM\SYSTEM\CurrentControlSet\Services\TSSERVER > comine.exe
HKLM\SYSTEM\CurrentControlSet\Services\Udfs
Hacker Defender 1.0 HKLM\SYSTEM\CurrentControlSet\Services\HackerDefender100 > hxdef100.exe
HKLM\SYSTEM\CurrentControlSet\Services\HackerDefenderDrv100 > hxdefdrv.sys
Aphex HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run >
<user defined name>.exe
Vanquish HKLM\SYSTEM\CurrentControlSet\Services\Vanquish > vanquish.exe
(a)
Rootkits & TrojansHidden Processes Detected
Berbew<random name>.exe
YYT Rootkitcomine.exe
Hacker Defender 1.0 hxdef100.exe, and any other processes with names matching the patterns specified in hxdef100.ini
AphexBy default, any process with a "~~"-prefixed name (which is configurable)
(b)
Figure 2: Hidden resources detected: (a) hidden Registry ASEP hooks; (b) hidden processes.

Several important points need to be made regarding the code above. First, notice the __declspec (naked) compiler directive. This prevents the compiler from generating prolog code for the function in order to ensure that the user-mode stack is in the right form at the time of a kernel-mode transition. Second, the function is labeled as NTAPI to ensure that the right C calling convention is used (in this case __stdcall). Third, the value that is moved into the EAX register is the index into a kernel-mode function dispatch table that tells the operating system which function to call: this value is unique to the function and varies from version to version of the operating system. Fourth, the "int 2eh" instruction sends a signal to the operating system to tell it to initiate a kernel-mode transition. Finally, the parameters exactly match the original query API because the operating system will pass them directly to the kernel-mode API.

Once the tool obtains "the truth" and then uses a regular Win32 API call to obtain "the lie", it compares the two scans and declares as hidden resources those that appear only in "the truth". It is possible to see false positives due to the creation or deletion (depending on the order the scans are performed) of resources in the time window between the scans. In practice this is usually not an issue. Also, this is easily mitigated by performing successive scans and taking the intersection of the missing resource sets to create the final result set.



Figures 3a-3c: Actual infection cases.

Experimental Results

Results from Lab Tests

We have tested the tool in our lab against the seven user-mode rootkits and Trojans shown in Figure 1. Although the implementations of these malware programs are quite different, our tool was able to efficiently and effectively detect all of them in a uniform way. Figure 2(a) and (b) show the detected hidden ASEP hooks and hidden processes, respectively, for each malware. The Urbin, Mersting, Berbew, and YYT Rootkit samples were captured from the wild, while the Hacker Defender, Aphex, and Vanquish samples were downloaded from the Web. The "AppInit_ DLLs" ASEP allows auto-loading of one or more DLLs into every Windows-based application that is running in the current log-on session [AID]; the "Services" ASEP allows installations of always-running services and drivers; the "Run" ASEP allows additional processes to be auto-started near log-in time.

Results from Actual Deployment

We have deployed the tool on over 200,000 desktop and server machines. The executable file is copied from a central machine to each target machine at scan time; the scan results are reported back to the central machine, and the executable file is removed. Figure 3 gives some examples of detected infections. They can be broadly classified into two categories: hiding Trojans and full-fledged rootkits. Figures 3 (a), (b), and (c) show three types of hiding Trojans: they were most likely installed by malicious Web servers that exploit visiting browsers' vulnerabilities [WBJ+05]. The Trojans in Figure 3 (a) hide their hooks to the "AppInit_ DLLs" ASEP, while the Trojans in Figure 3 (b) and (c) hide their randomly-named processes.

Figure 3 (d), (e), (f) show three cases of infections with full-fledged rootkits. We make the following observations: first, it is common for rootkits to create malware programs that have the same or similar filenames as some system programs but reside in a different directory; for example, one of the lsass.exe processes in Figure 3 (f) was instantiated from the lsass.exe malware program located in the "drivers" directory. Second, full-fledged rootkits tend to hook the "Services" ASEP to install services and drivers and they tend to hide multiple ASEP hooks and processes.

Rootkit Investigation Tool

Once a rootkit-infected machine is identified in an enterprise, it is important to investigate the hacker's intention and the damage that has been done, without disturbing the malware because some are designed to erase all traces of themselves once they realize that they have been detected. It is therefore highly desirable to have a tool that allows such non-intrusive investigations.

We have observed that configurable rootkits, such as the most popular Windows rootkit "Hacker Defender," typically support the notion of "root processes". A root process is not infected by the rootkit and can see "the truth". It is provided for the convenience of the rootkit users. For example, it can be very awkward for hackers if the resources are hidden from their tools as well; when a rootkit is used to hide a spyware browser add-on executable file, it gets really tricky if the file is also hidden from the browser process that is supposed to load it. With "root process" support, the hacker tools and the browser can be declared as root processes to ensure smooth operation, while the resources are still hidden from all the other processes, system utilities, and anti-malware scanners. In the case of Hacker Defender, "root processes" are listed in a configuration file via filenames specified with regular expressions.


Figures 3d-3f: Actual infection cases.

We have developed a technique to take advantage of the support for root processes to allow non-intrusive investigations. It works as follows [WB05]. First, the fast user-mode rootkit scanner is used to identify hidden processes. Very often, one or more of the hidden processes are also root processes (because these are the most critical processes for the infection). Suppose process "foo.exe" is a detected hidden, root process. In the second step, we make a copy of the command-window program "cmd.exe", rename it to "foo.exe", and launch it through "start foo.exe". Now we have a command window that is a root process that can see all previously hidden resources. In particular, the "dir" command from this window can see all hidden files, including the Hacker Defender configuration file which reveals critical information about the hacker's intention.

In the third step, we launch Task Manager, RegEdit, anti-virus scanner, anti-spyware scanner, etc. from this command window. Since this root process is not infected it cannot infect its child processes; as a result, all these utilities are now running as root processes that can see all previously hidden resources. After the investigation, malware processes, Registry entries, and files can all be terminated/deleted through these utilities.

Related Work

There are two different approaches to rootkit detection. The first approach targets the hiding mechanism by, for example, detecting the presence of API interceptions [YI, ZVI, YK, YKS, YV04]. It has at least two disadvantages: first, it cannot catch rootkit programs that do not use the targeted mechanism; second, it may catch as false positives legitimate uses of API interceptions for in-memory software patching, fault-tolerance wrappers, security wrappers, etc. The second approach targets the hiding behavior by detecting any discrepancies between "the truth" and "the lie". For example, comparing the output of "ls" and "echo *" can detect an infected "ls" program [B99]. Our user-mode rootkit detector belongs to the second category.

There is a subtle but important difference between the "cross-view diff" used in our proposal and the more common "cross-time diff" used in Tripwire [KS94] and the Strider Troubleshooter [WVS03, WVD+03]. The goal of a cross-time diff is to capture changes made to persistent state by essentially comparing snapshots from two different points in time (one before the changes and one after). In contrast, the goal of a cross-view diff is to detect hiding behavior by comparing two snapshots of the same state at exactly the same point in time, but from two different points of view (one through the infected path and one not). Cross-time diff is a more general approach for capturing a broader range of malware programs, hiding or not; the downside is that it typically includes a significant number of false positives stemming from legitimate changes and thus requires additional noise filtering, which has a negative impact on usability. In contrast, cross-view diff targets only hiding malware and usually has zero or very few false positives because legitimate programs rarely hide.

Ideally, "the truth" should be obtained from "outside the box" to eliminate the possibility of any malware intervention. The WinPE-based GhostBuster tool [WBV+05] took such an approach to obtain "the truth" of the file system and Registry. The PCI-add-in card described in the Copilot paper [PFM+04] or the Myrinet NIC described in the Bookdoors paper [BNG+04] can be used to obtain "the truth" of the process list through Direct Memory Access (DMA) without the knowledge or intervention of the potentially infected OS. Instead of targeting comprehensiveness, our user-mode rootkit detector targets efficiency, scalability, and ease of use with good coverage.

In response to the increasing popularity of stealth techniques among Windows malware, several rootkit detection tools have been released in recent months, including RootkitRevealer from Sysinternals, Blacklight Rootkit Eliminator from F-Secure, and IceSword from Xfocus.net. RootkitRevealer uses the same cross-view diff technique described in our previous paper on Inside-the-box GhostBuster [WBV+05]: it performs high- and low-level scans and reports the differences between these scans. For the file scans, it performs two low-level scans by reading the NTFS Master File Table and the NTFS on-disk directory index structures. For the low-level Registry scan, the tool reads the raw Registry hive files. A file discrepancy is reported if a file does not appear in all three scans. A Registry discrepancy is reported if the data, length, or type of a Registry value differs or if an entry is missing.

Blacklight is designed to detect hidden processes and files via a kernel-mode driver. In addition to running as a standalone process, it incorporates detection evasion technology: it may perform its scans through the Windows Explorer process. IceSword uses kernel-mode technology to detect hidden processes, hidden ports, hidden services, hidden auto-start programs, hidden files, hidden Browser Helper Objects, and hidden Registry entries. It monitors process creation and deletion and is able to disable filter drivers that prevent file creation and deletion. In order to achieve its functionality, the program loads a kernel-mode driver and then disables kernel-level debugging. Unlike the other rootkit tools, it has anti-rootkit attack technology to keep it from being disabled by malicious software. It achieves this by trapping keyboard strokes and requiring that the user hit Ctrl+Alt+D in order to put the program into a mode where it may be shutdown.

Similar rootkit problems exist on the Linux/UNIX platforms as well [PFM+04, YKS, YC, YW98, B99, YA03]. (In fact, the term "rootkit" originated from the root privilege concept on UNIX platforms.) A common technique used by Linux/UNIX rootkits to hide resources is to intercept system calls to the kernel via a Loadable Kernel Module (LKM) [ZK, YJ, J01]. For example, some rootkits are known to hook read, write, close, and the getdents (get directory entries) system calls. More advanced rootkits can directly patch the kernel in memory [YC98, YL01]. We discussed cross-view diff-based hidden resource detection for Linux/UNIX platforms in our previous paper [WBV+05].

As a final note, most of today's Windows rootkits do not modify OS files or memory image; rather, they "extend" the OS through ASEP hooking in a way that is indistinguishable from many other good software programs that also extend the OS. Therefore, it is difficult to apply the genuinity tests and software-based attestation techniques that detect deviations from a known-good hash of a well-defined OS memory range [KJ03, SPDK04]. On the other hand, these techniques can detect both hiding and non-hiding malware programs that modify the OS and are complementary to the cross-view diff approach.

Summary

User-mode rootkits are popular because they are more portable and reliable than kernel-mode rootkits. We have shown that there is a quick and easy way to detect all user-mode rootkits: by performing a cross-view diff between a high-level infected scan above rootkit interception and a low-level clean scan below the interception, our tool can precisely detect hidden Registry entries and processes within a few seconds. The simplicity and efficiency make it an attractive tool for scalable deployment in large enterprises to provide protection against new or customized rootkits that escape common signature-based anti-malware scanning. Detection results from actual deployment suggested that hiding Trojans, most likely installed through malicious Web sites, may be an even more serious concern than rootkits in terms of prevalence.

Author Information

Yi-Min Wang manages the Cybersecurity and Systems Management Research Group and leads the Strider project at Microsoft Research, Redmond. He received his Ph.D. in Electrical and Computer Engineering from University of Illinois at Urbana-Champaign in 1993, worked at AT&T Bell Labs from 1993 to 1997, and joined Microsoft in 1998. His research interests include security, systems management, dependability, home networking, and distributed systems.

Doug Beck is a senior developer at Microsoft where he has worked for the past six years. During his career at Microsoft Doug has focused on developing Systems Management software. He received a Ph.D. in Theoretical Physical Chemistry from the University of Washington in 1996 where he developed simulation software for solving partial differential equations as part of his research. Doug is currently working at Microsoft Research and can be reached at Doug.Beck@microsoft.com.

References

[AID] Working with the AppInit_DLLs registry value, https://support.microsoft.com/kb/q197571/.
[AS] Microsoft Windows Anti-Spyware, https://www.microsoft.com/spyware.
[B99] Brumley, D., "Invisible Intruders: Rootkits In Practice," ;login:, https://www.usenix.org/publications/login/1999-9/features/rootkits.html,1999.
[BNG+04] Bohra, A., I. Neamtiu, P. Gallard, F. Sultan, and L. Iftode, "Remote Repair of Operating System State Using Backdoors," Proc. Int. Conf. on Autonomic Computing (ICAC), pp. 256-263, May, 2004.
[HB99] Hunt, Galen and Doug Brubacher, "Detours: Binary Interception of Win32 Functions," Proc. the Third Usenix Windows NT Symposium, pp. 135-143, https://research.microsoft.com/sn/detours/, July, 1999.
[HB05] Hoglund, G. and J. Butler, Rootkits: Subverting The Windows Kernel, Addison-Wesley, 2005.
[J01] Jones, K., "Loadable kernel modules," ;login:, https://www.usenix.org/publications/login/2001-11/pdfs/jones2.pdf, Nov., 2001.
[KJ03] Kennell, Rick and Leah H. Jamieson, "Establishing the Genuinity of Remote Computer Systems," Proc. USENIX Security Symposium, August, 2003.
[KS94] Kim, G. H. and E. H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker," Proc. of the Second ACM Conf. on Computer and Communications Security, pp. 18-29, Nov., 1994.
[MSRT] Windows Malicious Software Removal Tool, https://www.microsoft.com/security/malwareremove/.
[PFM+04] Petroni, Jr., Nick L., Timothy Fraser, Jesus Molina, and William A. Arbaugh, "Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor," Proc. Usenix Security Symposium, Aug., 2004.
[SPDK04] Seshadri, A., A. Perrig, L. van Doorn, and P. Khosla, "SWATT: SoftWare-based ATTestation for Embedded Devices," Proc. IEEE Symp. on Security and Privacy, May, 2004.
[WB05] Wang, Yi-Min and Doug Beck, "How to `Root' a Rootkit That Supports Root Processes Using Strider GhostBuster Enterprise Scanner," Microsoft Research Technical Report MSR-TR-2005-21, February 11, 2005.
[WBJ+05] Wang, Yi-Min, Doug Beck, Xuxian Jiang, and Roussi Roussev, "Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities," Microsoft Research Technical Report MSR-TR-2005-72, August, 2005.
[WBV+05] Wang, Yi-Min, Doug Beck, Binh Vo, Roussi Roussev, and Chad Verbowski, "Detecting Stealth Software with Strider GhostBuster," Proc. DSN, June, 2005.
[WRV+04] Wang, Yi-Min, Roussi Roussev, Chad Verbowski, and Aaron Johnson, "Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management," Proc. Usenix LISA, Nov., 2004.
[WVD+03] Wang, Yi-Min, et al., "STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support," Proc. Usenix LISA, pp. 159-171, October, 2003.
[WVR+04] Wang, Yi-Min, Binh Vo, Roussi Roussev, Chad Verbowski, and Aaron Johnson, "Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files," Microsoft Research Technical Report MSR-TR-2004-71, July, 2004.
[WVS03] Wang, Yi-Min, Chad Verbowski, and Daniel R. Simon, "Persistent-state Checkpoint Comparison for Troubleshooting Configuration Failures," Proc. IEEE DSN, June, 2003.
[YA03] Chuvakin, A. "An Overview of UNIX Rootkits," iALERT White Paper, iDefense Labs, https://www.megasecurity.org/papers/Rootkits.pdf, February,2003.
[YC] The chkrootkit tool, https://www.chkrootkit.org/.
[YC98] Cesare, Silvio "Runtime kernel kmem patching," https://vx.netlux.org/lib/vsc07.html, Nov., 1998.
[YH03] "How to become unseen on Windows NT," https://rootkit.host.sk/knowhow/hidingen.txt, May 8, 2003.
[YI] Ivanov, Ivo, "API hooking revealed," https://www.codeproject.com/system/hooksys.asp.
[YJ] Jones, A. R., "A Review of Loadable Kernel Modules," https://www.giac.org/practical/gsec/Andrew_Jones_GSEC.pdf.
[YK] Keong, Tan Chew, "ApiHookCheck Version 1.01," https://www.security.org.sg/code/apihookcheck.html, April 15, 2004.
[YKS] KSTAT - Kernel Security Therapy Anti-Trolls, https://s0ftpj.org/en/tools.html.
[YL01] "Linux on-the-fly kernel patching without LKM," https://www.phrack.org/phrack/58/p58-0x07, Phrack Magazine, Dec., 2001.
[YN04] "NTIllusion - A portable Win32 userland rootkit.txt," Phrack Magazine, July 13, 2004.
[YV04] VICE - Catch the hookers! https://www.blackhat.com/presentations/bh-usa-04/bh-us-04-butler/bh-us-04-butler.pdf.
[YW98] "Weakening the Linux Kernel," Phrack Magazine, https://www.phrack.org/phrack/52/P52-18,Jan.,1998.
[ZK] Knark LKM-rootkit, https://www.sans.org/resources/idfaq/knark.php.
[ZVI] Vice, https://www.rootkit.com/project.php?id=20.
?Need help?


Last changed: 11 Nov. 2005 jel