On Sat, May 2, 2009 at 9:30 AM, fooler mail <[email protected]> wrote:
> On Thu, Apr 30, 2009 at 1:37 PM, Holden Hao <[email protected]> wrote:
>> Can you try if "rpm -V coreutils" returns anything?  I am interested to know
>> if the hacker was clever enough to alter the md5sums of the RPM database.
>
> hi holden,
>
> kernel based rootkit (eg. LKM rootkit) is much stronger and stealthy
> compare to application based rootkit... unlike with application based
> rootkit where the code inserted in the application... they moved and
> inserted the code to the kernel land... thus much stronger and
> stealthy...

So the application mkdir in the system is the real one but it is not
the one that is being executed but a "function" called from the kernel
itself?  So the hacker installed his own kernel.  It is a
sophisticated hack.  A thorough security audit is a must.

> aside from application, kernel, library, firmware, and other
> rootkits... there is recently found a bios rootkits (part of firmware
> rootkit) which can survive even if you reinstall or reformat your
> compromise server...
>
> http://www.theregister.co.uk/2009/03/24/persistent_bios_rootkits/

Very interesting and scary!


Holden
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to