TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Userland rootkits are lame (2022)

45 点作者 qweqwe1411 个月前

7 条评论

grugq11 个月前
Author here.<p>The context of this post is somewhat important. It is a direct response to a post titled: <i>Symbiote Deep-Dive: Analysis of a New, Nearly-Impossible-to-Detect Linux Threat</i><p>Userland rootkits are not “<i>nearly-impossible-to-detect</i>.” They are not novel, they are not impossible to detect, and they are not the pinnacle of hacker techniques.<p>I felt that it was worth pointing out that the history of userland rootkits goes back a ways and that they were very easy to detect because they rely on proxying all access to the system. If you bypass the hook they use to enter their proxy, they you evade them entirely.<p>Forensic and incident response guides used to advise using static linked binaries for exactly this reason. There are guides from the 1990s telling people to do this because userland rootkits were an issue (before kernel rootkits everyone used userland rootkits.)<p>Here is an example from 2013 which points out that you can’t trust any binaries&#x2F;libraries on the potentially compromised machine and should use statically linked tools. [0]<p>LD_PRELOAD rootkits are not new and they are not nearly-impossible-to-detect to detect. My post listed a number of ways to detect them, all of which have been known for decades.<p>[0] <a href="https:&#x2F;&#x2F;www.forensicfocus.com&#x2F;forums&#x2F;general&#x2F;trusted-static-linked-binaries-for-linux-live-forensic&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.forensicfocus.com&#x2F;forums&#x2F;general&#x2F;trusted-static-...</a>
评论 #40843828 未加载
mike_d11 个月前
Adversaries live by the saying &quot;if it works it isn&#x27;t stupid.&quot;
评论 #40843036 未加载
notepad0x9011 个月前
ld_preload is the lazy way of doing userland rootkits. there are other ways.<p>For example, you can patch libc, and by patch I mean there are different ways of patching. a simply binary patch is unreliable because it&#x27;d be pinned to a specific version but you can parse the elf symbols dynamically and patch them, even when libc is updated (assuming certain critical symbols are unlikely to ever change) so it becomes reliable. a lot of &quot;static&quot; programs still dynamically load libc.<p>There is also a more aggressive but easily detectable approach, just patch every elf file on the system so that that the _start&#x2F;entry always does <i>something</i> to prevent discovery of the malware like messing with the plt so that all function calls are proxied through rootkit code, where the rootkit filters for parameters and return values it doesn&#x27;t like.<p>Kernel rookits are great but secure boot is also a thing, if implemented correctly it would be very difficult to beat. you don&#x27;t even have to go full on rootkit, just a stealthy implant running as root via a hijacked dynamic library (doesn&#x27;t have to be libc) will do. this isn&#x27;t windows, it&#x27;s not like there is a reliable&#x2F;common way of making sure system libraries are legit (like authenticode&#x2F;pe signing). The package managers make sure the correct binaries are being installed but they don&#x27;t have something like sfc on windows (system file checker) that refuses to let the system boot if files are corrupt and&#x2F;or restore tampered system executables.
评论 #40843294 未加载
rascul11 个月前
Is it really practical to just statically compile everything so you don&#x27;t get a rootkit? Is that really the solution?
评论 #40842574 未加载
评论 #40842600 未加载
评论 #40843134 未加载
评论 #40842682 未加载
alkonaut11 个月前
If it’s weak, I’d expect a standard distribution to detect it by itself and inform the user.<p>Only revealing itself to a defender who looks for it sounds like it’ll be working as intended in almost all cases.
benob11 个月前
What are uses of LD_PRELOAD that make us keep it?
评论 #40842668 未加载
评论 #40842697 未加载
评论 #40842983 未加载
评论 #40843287 未加载
评论 #40842664 未加载
评论 #40842665 未加载
from-nibly11 个月前
This sounds like a food youtuber trying to explain how easy cooking a Turkey is. Yeah sure in a vaccum maybe, but I don&#x27;t spend all day cooking food. Ive got other stuff to do.<p>Maybe its easy to find rootkits if you know what you are doing and use a statically compiled tcpdump. Do you know how many times I&#x27;ve done a TCP dump on my computer to check for root kits statically compiled or not? 0. I don&#x27;t spend my time doing that. All it has to do is use less CPU and RAM than my corporate anti virus already does ( which is a lot ) and I&#x27;m never going to find it, cause im never gonna look.
评论 #40842535 未加载
评论 #40842640 未加载
评论 #40842255 未加载
评论 #40842659 未加载
评论 #40842303 未加载