Calendar
May 2022 M T W T F S S « Oct 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 -
Recent Posts
Recent Comments
- What symbol tables stay after a strip In ELF format? | CL-UAT on The Art Of ELF: Analysis and Exploitations
- sslsniff howto dump the temporary key | DiabloHorn on The magic of LD_PRELOAD for Userland Rootkits
- Robert Larsen on The Art Of ELF: Analysis and Exploitations
- EasyPreload – A tool for intercepting calls with LD_PRELOAD « Boxcar's Blunderbuss on The magic of LD_PRELOAD for Userland Rootkits
- The magic of LD_PRELOAD for Userland Rootkits | FlUxIuS’ Blog | FRANCESCO DI FUSCO on The magic of LD_PRELOAD for Userland Rootkits
Archives
Categories
Meta
Blogroll
Tag Archives: rootkit
The magic of LD_PRELOAD for Userland Rootkits
How much can you trust binaries you are running, even if you had analyzed them before compilation? With less privileges than kernel rootkits (explained in “Ring 0f Fire”), userland rootkits still represent a big threat for users. To see … Continue reading
Ring 0f Fire : Rootkits and DKOM
Many books and papers cover the subject of Rootkits. I wrote this article to describe my first steps. Here, you will learn what a rootkit is and how does it work. Also you will find an attack using DKOM. For … Continue reading