Make An Linux Kernel Rootkit Visible Again



A make an LKM rootkit visible again.

It involves getting the memory address of a rootkit’s “show_module” function, for example, and using that to call it, adding it back to lsmod, making it possible to remove an LKM rootkit.

We can obtain the function address in very simple kernels using /sys/kernel/tracing/available_filter_functions_addrs, however, it is only available from kernel 6.5x onwards.

An alternative to this is to scan the kernel memory, and later add it to lsmod again, so it can be removed.

So in summary, this LKM abuses the function of lkm rootkits that have the functionality to become visible again.

OBS: There is another trick of removing/defusing a LKM rootkit, but it will be in the research that will be launched.



https://www.kitploit.com/2024/09/imperius-make-linux-kernel-rootkit.html







0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *