ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
ROOTKITs
by somma (fixbrain@gmail.com)
22000-00-00
Contents
Classification of ROOTKITs
Type II ROOTKITs
Type III ROOTKITs
Next Generation ROOTKITs
Classification of ROOTKITs
1st
Generation ( Type I )
Does not modify OS / Process / etc¡­
-> replace / modified system file
-> UNIX login backdoor (binary modification)
2nd
Generation ( Type II )
Modifies which designed not to be modified
-> code of process, modules, OS code, kernel modules, etc¡­
-> NTRootkit (Pioneer of Windows Kernel based ROOTKIT), NTIllusion, etc¡­
3rd
Generation ( Type III )
Modifies which designed to be modified
-> data sections, heap, stack, etc¡­
-> FU (Pioneer of DKOM - Direct Kernel Object Manipulation)
The NEXT Generation
virtualization ?
32000-00-00
Type II ROOTKITs
NTIllusion
Hacker defender
NTRootkit
- The first windows NT kernel based ROOTKIT
Sony Rootkit
modifies
code section (e.g. Import table, Export table)
user mode / Kernel mode APIs
kernel mode undocumented APIs
ISR (Interrupt Service Routine)
MSR (Model Specific Register)
¡­
42008-05-16
Type II ROOTKITs ¨C cont.
API Hooking
52008-05-16
Type II ROOTKITs ¨C cont.
SDT Hooking (http://somma.egloos.com/2731001)
62008-05-16
Type II ROOTKITs ¨C cont.
IDT Hooking (http://somma.egloos.com/3365054)
72008-05-16
Type II ROOTKITs ¨C cont.
DEMO
- API Hooking (Ring 3) (CheatEngine)
- Code Injection (Ring 3) (WinMine.exe hacking)
- SDT hooking (Ring 0) (FxLoader / bkdp.sys)
- IDT hooking (Ring 0) (SDFP ¨C app.exe / template.sys ¨C real
machine)
82008-05-16
Type III ROOTKITs
FU
- The first ROOTKIT introduce DKOM (Direct Kernel Object Manipulation)
He4Hook
- RAW IRP hooking on File system driver
PHIDE2
Layered driver (Filter driver)
modifies
data sections
IRP handlers
kernel objects that allocated and managed dynamically
¡­
92008-05-16
Type III ROOTKITs ¨C cont.
Break EPROCESS list
102008-05-16
Type III ROOTKITs ¨C cont.
Break DRIVER_OBJECT list
112008-05-16
Type III ROOTKITs ¨C cont.
DEMO
- FU rootkit
- jeng_2
SDT hook & DKOM example
122008-05-16
Fighting ROOTKITs
Check IAT (Import Address Table)
Check inline hooks
Check System Service Dispatch Table (ntoskrnl.exe)
Check Shadow table (win32k.sys)
Check Driver¡¯s IRP handler
Check MSR ( MSR_SYSENTER )
¡­
how ?
ECD (Explicit Compromise Detection)
Cross View Based Detection
use DKOM to find out ROOTKITs
- dump PspCidTable
- trace OS Scheduler data base, etc¡­
Virtual Machine Monitor (http://northsecuritylabs.com/products.aspx )
132008-05-16
Fighting ROOTKITs ¨C cont.
DEMO
- API Hook detection and API Hook removal
hook_shield
PlgnPETest.dll
- Finding process FU hided by DKOM technique
dump PspCidTable
142008-05-16
Next Generation ROOTKITs
DEMO
- Hypervisor based rootkit
152008-05-16
Q & A
162008-05-16

More Related Content

Viewers also liked (6)

PPT
Factors affecting system performance
Forrester High School
?
PPT
Factors which affect the speed of internet computer studies lesson
Mukalele Rogers
?
PPTX
Graphic Processing Unit (GPU)
Jafar Khan
?
PPT
Computer +forensics
Rahul Baghla
?
PPTX
Computer forensics powerpoint presentation
Somya Johri
?
PPTX
Computer forensics ppt
Nikhil Mashruwala
?
Factors affecting system performance
Forrester High School
?
Factors which affect the speed of internet computer studies lesson
Mukalele Rogers
?
Graphic Processing Unit (GPU)
Jafar Khan
?
Computer +forensics
Rahul Baghla
?
Computer forensics powerpoint presentation
Somya Johri
?
Computer forensics ppt
Nikhil Mashruwala
?

Similar to About rootkit (20)

PDF
CarolinaCon 2008 Rootkits Then and Now
Tyler Shields
?
PDF
Hunting rootkits with windbg
Frank Boldewin
?
PDF
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Tyler Shields
?
PDF
Bootkits: Past, Present & Future - Virus Bulletin
ESET
?
PDF
Wonder walk in Rootkit Land by Himanshu Khokhar
OWASP Delhi
?
PDF
Linux kernel-rootkit-dev - Wonokaerun
idsecconf
?
PPTX
TDL3 Rootkit Background
David Sweigert
?
PPT
Anton Chuvakin on illogic Rootkit Analysis
Anton Chuvakin
?
PPT
Rootkit Hunting & Compromise Detection
amiable_indian
?
PDF
Bootkits: past, present & future
Alex Matrosov
?
PDF
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
FFRI, Inc.
?
PDF
Userland Hooking in Windows
High-Tech Bridge SA (HTBridge)
?
PDF
Reversing & malware analysis training part 12 rootkit analysis
Abdulrahman Bassam
?
PPTX
Defeating x64: Modern Trends of Kernel-Mode Rootkits
Alex Matrosov
?
PPTX
How well do you know your runtime
Rob Gillen
?
PPTX
Telehack: May the Command Line Live Forever
Gregory Hanis
?
PDF
Rootkit 101 - 2nd Edition
Chia-Hao Tsai
?
PDF
Rootkit&honeypot aalonso-dcu-dec09
Angelill0
?
CarolinaCon 2008 Rootkits Then and Now
Tyler Shields
?
Hunting rootkits with windbg
Frank Boldewin
?
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Tyler Shields
?
Bootkits: Past, Present & Future - Virus Bulletin
ESET
?
Wonder walk in Rootkit Land by Himanshu Khokhar
OWASP Delhi
?
Linux kernel-rootkit-dev - Wonokaerun
idsecconf
?
TDL3 Rootkit Background
David Sweigert
?
Anton Chuvakin on illogic Rootkit Analysis
Anton Chuvakin
?
Rootkit Hunting & Compromise Detection
amiable_indian
?
Bootkits: past, present & future
Alex Matrosov
?
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
FFRI, Inc.
?
Userland Hooking in Windows
High-Tech Bridge SA (HTBridge)
?
Reversing & malware analysis training part 12 rootkit analysis
Abdulrahman Bassam
?
Defeating x64: Modern Trends of Kernel-Mode Rootkits
Alex Matrosov
?
How well do you know your runtime
Rob Gillen
?
Telehack: May the Command Line Live Forever
Gregory Hanis
?
Rootkit 101 - 2nd Edition
Chia-Hao Tsai
?
Rootkit&honeypot aalonso-dcu-dec09
Angelill0
?
Ad

Recently uploaded (20)

PDF
Next level data operations using Power Automate magic
Andries den Haan
?
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
?
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
?
PDF
Unlocking FME Flow¡¯s Potential: Architecture Design for Modern Enterprises
Safe Software
?
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
?
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
?
PPTX
Enabling the Digital Artisan ¨C keynote at ICOCI 2025
Alan Dix
?
PPTX
Practical Applications of AI in Local Government
OnBoard
?
PDF
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
?
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
?
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
?
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
?
PPTX
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
?
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) ºÝºÝߣs
Ravi Tamada
?
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
?
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
?
PDF
Kubernetes - Architecture & Components.pdf
geethak285
?
PDF
How to Visualize the ?Spatio-Temporal Data Using CesiumJS?
SANGHEE SHIN
?
PDF
99 Bottles of Trust on the Wall ¡ª Operational Principles for Trust in Cyber C...
treyka
?
PDF
The Future of Product Management in AI ERA.pdf
Alyona Owens
?
Next level data operations using Power Automate magic
Andries den Haan
?
Why aren't you using FME Flow's CPU Time?
Safe Software
?
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
?
Unlocking FME Flow¡¯s Potential: Architecture Design for Modern Enterprises
Safe Software
?
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
?
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
?
Enabling the Digital Artisan ¨C keynote at ICOCI 2025
Alan Dix
?
Practical Applications of AI in Local Government
OnBoard
?
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
?
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
?
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
?
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
?
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
?
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) ºÝºÝߣs
Ravi Tamada
?
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
?
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
?
Kubernetes - Architecture & Components.pdf
geethak285
?
How to Visualize the ?Spatio-Temporal Data Using CesiumJS?
SANGHEE SHIN
?
99 Bottles of Trust on the Wall ¡ª Operational Principles for Trust in Cyber C...
treyka
?
The Future of Product Management in AI ERA.pdf
Alyona Owens
?
Ad

About rootkit

  • 2. 22000-00-00 Contents Classification of ROOTKITs Type II ROOTKITs Type III ROOTKITs Next Generation ROOTKITs
  • 3. Classification of ROOTKITs 1st Generation ( Type I ) Does not modify OS / Process / etc¡­ -> replace / modified system file -> UNIX login backdoor (binary modification) 2nd Generation ( Type II ) Modifies which designed not to be modified -> code of process, modules, OS code, kernel modules, etc¡­ -> NTRootkit (Pioneer of Windows Kernel based ROOTKIT), NTIllusion, etc¡­ 3rd Generation ( Type III ) Modifies which designed to be modified -> data sections, heap, stack, etc¡­ -> FU (Pioneer of DKOM - Direct Kernel Object Manipulation) The NEXT Generation virtualization ? 32000-00-00
  • 4. Type II ROOTKITs NTIllusion Hacker defender NTRootkit - The first windows NT kernel based ROOTKIT Sony Rootkit modifies code section (e.g. Import table, Export table) user mode / Kernel mode APIs kernel mode undocumented APIs ISR (Interrupt Service Routine) MSR (Model Specific Register) ¡­ 42008-05-16
  • 5. Type II ROOTKITs ¨C cont. API Hooking 52008-05-16
  • 6. Type II ROOTKITs ¨C cont. SDT Hooking (http://somma.egloos.com/2731001) 62008-05-16
  • 7. Type II ROOTKITs ¨C cont. IDT Hooking (http://somma.egloos.com/3365054) 72008-05-16
  • 8. Type II ROOTKITs ¨C cont. DEMO - API Hooking (Ring 3) (CheatEngine) - Code Injection (Ring 3) (WinMine.exe hacking) - SDT hooking (Ring 0) (FxLoader / bkdp.sys) - IDT hooking (Ring 0) (SDFP ¨C app.exe / template.sys ¨C real machine) 82008-05-16
  • 9. Type III ROOTKITs FU - The first ROOTKIT introduce DKOM (Direct Kernel Object Manipulation) He4Hook - RAW IRP hooking on File system driver PHIDE2 Layered driver (Filter driver) modifies data sections IRP handlers kernel objects that allocated and managed dynamically ¡­ 92008-05-16
  • 10. Type III ROOTKITs ¨C cont. Break EPROCESS list 102008-05-16
  • 11. Type III ROOTKITs ¨C cont. Break DRIVER_OBJECT list 112008-05-16
  • 12. Type III ROOTKITs ¨C cont. DEMO - FU rootkit - jeng_2 SDT hook & DKOM example 122008-05-16
  • 13. Fighting ROOTKITs Check IAT (Import Address Table) Check inline hooks Check System Service Dispatch Table (ntoskrnl.exe) Check Shadow table (win32k.sys) Check Driver¡¯s IRP handler Check MSR ( MSR_SYSENTER ) ¡­ how ? ECD (Explicit Compromise Detection) Cross View Based Detection use DKOM to find out ROOTKITs - dump PspCidTable - trace OS Scheduler data base, etc¡­ Virtual Machine Monitor (http://northsecuritylabs.com/products.aspx ) 132008-05-16
  • 14. Fighting ROOTKITs ¨C cont. DEMO - API Hook detection and API Hook removal hook_shield PlgnPETest.dll - Finding process FU hided by DKOM technique dump PspCidTable 142008-05-16
  • 15. Next Generation ROOTKITs DEMO - Hypervisor based rootkit 152008-05-16