Hello All, I was writing as we just posted an in depth analysis of the phalanx2 rootkit. It covers using Volatlity for memory analysis and IDA and other reversing tools for static and dynamic binary analysis:
http://volatility-labs.blogspot.com/2012/10/phalanx-2-revealed-using-volatility-to.html The malware uses many interesting techniques that we have never seen before in a Linux rootkit and was very interesting to analyze. If you have any questions or comments please either comment on the blog or email the list. Thanks, Andrew
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
