Posts
Backdoor initramfs and Make Your Rootkit Persistent
Pub 2017-04-26; LastMod 2017-04-26In the last post I explained how to hide Linux processes with an LKM rootkit. As you might know, Linux kernel modules are not persistent; that means that you have to insert your module each time your system goes through a reboot.
āBut how the heck do I have modules loaded at startup ? Is lsmod
bullshitting me ?ā you might be asking.
The short answer: āinitramfsā
The long answer is, well, longer and needs some explanations first.
(...)Hiding Processes for Fun and Profit
Pub 2017-01-10; LastMod 2017-01-10I’ve recently been interested in Linux rootkits, and it turns out that behind that sexy name lay simple C programs. Being curious, I started looking for publicly available rootkits and tried to compile them to see how they work: Too bad ! Most of the rootkits I came across were written for Linux versions 2.x and 3.x, and I am running version 4.8 ā¦ That meant that the code and data structures changed heavily since then, and there was little to no documentation on the subject !! So I digged through the sources of the Linux kernel and tried to figure out how things worked.
(...)Setting up Tacacs+ With LDAP authentication
Pub 2016-03-19; LastMod 2016-03-19Working with multiple network equipments is a task that every network administrator have faced, and if you are one yourself, you are probably convinced by now that using multiple or a single password isnāt the brightest idea.
Tacacs+ is a proprietary protocol developed by Cisco to ensure the AAA functions: Authentication, Authorization and Accounting. I wonāt go through the details of the protocol as itās not the purpose of this guide, but if you want to know more about it, you can find interesting links at the end of this article.
(...)