Re: System call hooking in 2.6 kernel..

2008-11-12 Thread lech
[EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] Message-ID: [EMAIL PROTECTED] X-Sender: [EMAIL PROTECTED] Received: from chello089079223139.chello.pl [89.79.223.139]

Re: System call hooking in 2.6 kernel..

2008-11-11 Thread sandeep lahane
Hi, If I am not missing anything and if there is libc wrapper provided for calls to be trapped then I think this can be done userspace. Just write the wrappers for calls to be trapped and and make a shared lib out of it, and then do a LD_PRELOAD of that lib, or add it to /etc/ld.so.preload. So

Re: System call hooking in 2.6 kernel..

2008-11-11 Thread Manish Katiyar
space, which would do this thing. I am concerned about portability. I thought, I could do this using hooking. Thats why I asked about it. Regards, Ashish --- On Mon, 10/11/08, Manish Katiyar [EMAIL PROTECTED] wrote: From: Manish Katiyar [EMAIL PROTECTED] Subject: Re: System call hooking

Re: System call hooking in 2.6 kernel..

2008-11-11 Thread Vimal
the sysadmin sets LD_PRELOAD to /lib/libunlinkwrapper.so which overrides the unlink() system call to add logging. now a nasty user wants to delete a file using unlink() (though she could use others to change the content of the file) without being traced by the sysadmin. to achieve this she

Re: System call hooking in 2.6 kernel..

2008-11-11 Thread sandeep lahane
On Tue, Nov 11, 2008 at 11:28 PM, Vimal [EMAIL PROTECTED] wrote: the sysadmin sets LD_PRELOAD to /lib/libunlinkwrapper.so which overrides the unlink() system call to add logging. now a nasty user wants to delete a file using unlink() (though she could use others to change the content of the

Re: System call hooking in 2.6 kernel..

2008-11-11 Thread Matthias Kaehlcke
El Tue, Nov 11, 2008 at 02:29:34PM +0530 sandeep lahane ha dit: Can you elaborate a little please? the sysadmin sets LD_PRELOAD to /lib/libunlinkwrapper.so which overrides the unlink() system call to add logging. now a nasty user wants to delete a file using unlink() (though she could use

Re: System call hooking in 2.6 kernel..

2008-11-11 Thread sandeep lahane
On Tue, Nov 11, 2008 at 3:56 PM, sandeep lahane [EMAIL PROTECTED] wrote: On Tue, Nov 11, 2008 at 3:34 PM, Matthias Kaehlcke [EMAIL PROTECTED] wrote: El Tue, Nov 11, 2008 at 02:29:34PM +0530 sandeep lahane ha dit: Can you elaborate a little please? the sysadmin sets LD_PRELOAD to

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Pranav Peshwe
On Mon, Nov 10, 2008 at 2:36 PM, ashish mahamuni [EMAIL PROTECTED]wrote: Hello All, I am trying to write a module which will log the user who deleted the file... So, I am thinking of hooking the unlink system call... Which is the best way to achieve this? Is it possible in 2.6 kernel? Hi

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Matthias Kaehlcke
El Mon, Nov 10, 2008 at 12:03:27PM +0100 [EMAIL PROTECTED] ha dit: Which is the best way to achieve this? Is it possible in 2.6 kernel? You might generally want patch the kernel, because syscall table is not exported in 2.6 and access to it through a module becomes more complicated from

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Peter Teoh
On Mon, Nov 10, 2008 at 8:51 PM, [EMAIL PROTECTED] wrote: Oh I forget - you can take (copy+paste maybe) location of all the calls from System.map file for your kernel - it is available with majority of distributions and at any custom compilations. You'll find howtos on the net. The code I

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Peter Teoh
On Mon, Nov 10, 2008 at 5:06 PM, ashish mahamuni [EMAIL PROTECTED] wrote: Hello All, I am trying to write a module which will log the user who deleted the file... So, I am thinking of hooking the unlink system call... Which is the best way to achieve this? Is it possible in 2.6 kernel? How

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread lech
Oh I forget - you can take (copy+paste maybe) location of all the calls from System.map file for your kernel - it is available with majority of distributions and at any custom compilations. You'll find howtos on the net. The code I mentioned in previous post follows IDT handler for int 0x80 to

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Matthias Kaehlcke
El Mon, Nov 10, 2008 at 11:16:06PM +0800 Peter Teoh ha dit: On Mon, Nov 10, 2008 at 5:06 PM, ashish mahamuni [EMAIL PROTECTED] wrote: Hello All, I am trying to write a module which will log the user who deleted the file... So, I am thinking of hooking the unlink system call... Which

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread ashish mahamuni
or process deleted. Cause ultimately it'll call the unlink sys call.. Regards Ashish --- On Mon, 10/11/08, Henrik Austad [EMAIL PROTECTED] wrote: From: Henrik Austad [EMAIL PROTECTED] Subject: Re: System call hooking in 2.6 kernel.. To: [EMAIL PROTECTED] Date: Monday, 10 November, 2008, 3:43 PM

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Henrik Austad
On Monday 10 November 2008 11:28:41 ashish mahamuni wrote: Hello Henrik, I came across a method over a google. this is where you provide the URL for the howto :-) They've shown the way something like this: The easiest way is to modify in kernel mode the system call table, where all

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread lech
Hi Which is the best way to achieve this? Is it possible in 2.6 kernel? You might generally want patch the kernel, because syscall table is not exported in 2.6 and access to it through a module becomes more complicated from version to version. Possibly someone from the group would suggest a

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Fernando ApesteguĂ­a
On 11/10/08, ashish mahamuni [EMAIL PROTECTED] wrote: Hello All, I am trying to write a module which will log the user who deleted the file... So, I am thinking of hooking the unlink system call... Which is the best way to achieve this? Is it possible in 2.6 kernel? You can use this ugly

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread lech
[EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] Message-ID: [EMAIL PROTECTED] X-Sender: [EMAIL PROTECTED] Received: from chello089079223139.chello.pl [89.79.223.139] with HTTP/1.1 (POST); Mon, 10 Nov 2008 22:24:14 +0100 User-Agent: RoundCube Webmail/0.1

Re: System call hooking in 2.6 kernel..

2008-11-10 Thread Peter Teoh
On Tue, Nov 11, 2008 at 5:24 AM, [EMAIL PROTECTED] wrote: there is only 4 debug registers available, whereas kprobe allow limitless (almost) numbers of probe points. Well yes - but if you want to trace syscalls you can just set the trap for the call gate. yes, of course, since all