TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

There’s a rootkit in the closet

127 点作者 posthumangr大约 15 年前

4 条评论

vog大约 15 年前
There’s something that puzzles me. The author found a rootkit and saw that it was integrated very deeply in the system. Yet he tried to fix the system <i>from within</i>!<p>Only after some failed attempts to download and install a new kernel, he finally did the Right Thing and shut down the server to analyze the hard disk from outside.<p>To everyone who encounters such a rootkit, I strongly recommend to <i>skip this second step</i>. If you see such a deeply integrated rootkit, shut down the computer immediately! <i>No fiddling!</i> Then, take out the hard disk and copy and analyze it as described in the article.<p>Otherwise, you’d enable the rootkit to hide its traces, and to maybe destroy some data. You don’t learn anything from that fiddling. Satisfy your curiosity only <i>after perpetuating evidence</i>! (i.e. after copying the hard disk’s data)
ratsbane大约 15 年前
Upvoted both for the content and expository writing style. He did a nice job not just of solving the problem but also showing how he did it.
barrkel大约 15 年前
If this style of interception becomes popular, it seems to argue for a statically linked busybox or similar that uses syscalls directly.
评论 #1188739 未加载
评论 #1189360 未加载
iman大约 15 年前
It's often said that privilege escalation under Linux is very easy. Why is Linux so insecure in this aspect?<p>Why does OpenBSD not suffer from local root exploits?