-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Linux kernel rootkit techniques #998
Comments
Some of the rule ideas I thought of is:
|
Hi @mike-hunhoff , I have gone through the mentioned blog post and it covers so many techniques like I would be grateful if you could please give me a starting point. Thank you. |
@dhruvak001 @hafizfarhad we've had the most success with capa rules that leverage |
Got It! Thank you so much @mike-hunhoff |
@mike-hunhoff According to me 5. Unlinking a module from the kernel’s module list to avoid detection and 6. Modifying struct cred to escalate privileges (e.g., root UID), would be good to start with for capa rules? |
Those sound reasonable to me, although, based on your description here these rules will require |
https://inferi.club/post/the-art-of-linux-kernel-rootkits
The text was updated successfully, but these errors were encountered: