On Thu, Apr 30, 2009 at 1:37 PM, Holden Hao <[email protected]> wrote:
> Can you try if "rpm -V coreutils" returns anything?  I am interested to know
> if the hacker was clever enough to alter the md5sums of the RPM database.

hi holden,

kernel based rootkit (eg. LKM rootkit) is much stronger and stealthy
compare to application based rootkit... unlike with application based
rootkit where the code inserted in the application... they moved and
inserted the code to the kernel land... thus much stronger and
stealthy...

the one we saw with Cupid's problem is an LKM rootkit where it
overrides the system call of the kernel (based on the strace output
that we saw)...

LKMs are used for:

1. device drivers
2. filesystem drivers
3. system calls
4. network drivers
5. tty line disciplines
6. executable interpreters

it uses number 3 to attached its code...

aside from application, kernel, library, firmware, and other
rootkits... there is recently found a bios rootkits (part of firmware
rootkit) which can survive even if you reinstall or reformat your
compromise server...

http://www.theregister.co.uk/2009/03/24/persistent_bios_rootkits/

therefore.. expect a more powerful and hybrid rootkits to come with a
combination of those rootkits that i mentioned...

fooler.
+ there is no such thing as 100% bullet proof security system... only
layers of defense... always be prepared when time comes..
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to