Rootkits: The Basics: Tim Shelton (BL4CK) Black Security
Rootkits: The Basics: Tim Shelton (BL4CK) Black Security
Rootkits: The Basics: Tim Shelton (BL4CK) Black Security
Tim Shelton
[BL4CK] Black Security
[email protected]
http://blacksecurity.org
Environment Subsystems
System & Service
Processes User Apps
OS/2 POSIX
Subsystem DLL
Win32
User
Kernel
Executive
Win32
Device
Kernel User/GDI
Drivers
Hardware Abstraction Layer (HAL)
Startup/Shutdown Procedure
report as “hooked”
undetectable?
• That’s why blackhats are driven to
continue our research for 0day
functions
Hooking interrupts
/dev/mem)
[email protected]
hidden
SuckIT– scans the IDT (Interrupt
Descriptor Table) for FAR JMP
*0xSCT[eax]
hostname
uname
other binaries executed on startup
2006 Black Security 33
Mac OSX Rootkits
History
Still in early stages of research
Nemo released WeaponX as an
original Proof-of-Concept
Mac responded by hardening their
O/S Internals
Nemo responded (like any self-
/* write shellcode */
vm_write(task,address,shellcode)
/* overwrite pointer */
vm_write(task + offset,pointer address)
O
<|>
/\
Thanks to:
Nemo & AndrewG
http://felinemenace.org
Rebel
Izik – TTY64 Project
http://tty64.org
#black crew