Skip to content

just a basic rootkit for learning how to playing sys_call_table

Notifications You must be signed in to change notification settings

rbertin/basic-rootkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

basic-rootkit

I posted this very basic rootkit (and old) on github only for educational purpose and is no longer usable on modern linux system.

In the first part the rootkit just sets parameter for creating a characters driver.

In the second part (most interesting) the rootkit is reading the System.map-* file for getting memory address of the sys_call_table symbol. When found, a hook is set on the syscall __NR_open (after disabled the cr0 bit).

Then, if a userland process call the "open" function with the adequate parameter (in my case it's /tmp/pwn), so the process gain root privileges.

About

just a basic rootkit for learning how to playing sys_call_table

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published