You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Running ln -s <HIDDEN_FILE> <FOO>, allows one to
leak hidden file's content (cf /etc/ld.so.preload).
Solution:
When calling open(2) (or equivalent), eventual symlinks shall be followed
by hand, checking for eventual hidden files on it.
This way, ENOENT or replacement file can be returned in place of
the hidden file.
Example:
What user think he does:
ln -s /etc/ld.so.preload ~/tutu
ls -l ~/tutu` tutu -> /etc/ld.so.preload
lrwxr-xr-x 1 user group 64 Feb 25 00:57 ~/tutu -> /etc/ld.so.preload
What is really done:
ln -s /etc/${PREFIX}ld.so.preload ~/tutu
ls -l ~/tutu` tutu -> /etc/${PREFIX}ld.so.preload
lrwxr-xr-x 1 user group 64 Feb 25 00:57 ~/tutu -> /etc/${PREFIX}ld.so.preload
NOTES:
This technique makes it potentially impossible to
manually uninstall the rootkit so we need to include a remover.
We need to manage any type of files (directories, files, ...)
If ld.so.preload exists to install, backup the file,
and realize the following senario:
Problem:
Running
ln -s <HIDDEN_FILE> <FOO>
, allows one toleak hidden file's content (cf /etc/ld.so.preload).
Solution:
When calling open(2) (or equivalent), eventual symlinks shall be followed
by hand, checking for eventual hidden files on it.
This way, ENOENT or replacement file can be returned in place of
the hidden file.
Example:
NOTES:
manually uninstall the rootkit so we need to include a remover.
and realize the following senario:
The text was updated successfully, but these errors were encountered: