SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Rootkit ? How To Build it
 Hanafi Ali Jan, ST, C|EH
 Security Analyst #HaNJiaN
Rootkit
Rootkit = Super Malware
Rootkit = Super Polymorph
Rootkit = Super Stealth Process
Rootkit = Driver for ALL Platform
How To Build ? 
• Asm = Master of “Security”
• C = Semi Core & Basic Lenguage for it
• C# = Controller for it
Rootkit Power 
•   Polimorph
•   Double Self
•   Stealth Process
•   Hidding Access
•   Keylogging
•   Installing Considerations
•   Ghost Tracker
•   E-mail Reporting
•   Filter Drivers
•   Users Hooks
•   Kernel Hooks
•   Control Processing
Kernel Rootkit in Platform


Knark (Linux)
Adore (Linux)
Plasmoid’s Solaris Loadable (Solaris)
Windows NT kernel-level RootKit (Windows)

Weitere ähnliche Inhalte

Andere mochten auch (15)

Jersey's resume
Jersey's resumeJersey's resume
Jersey's resume
 
China job interview tv show
China job interview tv showChina job interview tv show
China job interview tv show
 
Png 492 pec final-presentation[1][1]
Png 492  pec final-presentation[1][1]Png 492  pec final-presentation[1][1]
Png 492 pec final-presentation[1][1]
 
Ethical hacker
Ethical hackerEthical hacker
Ethical hacker
 
Design for good
Design for goodDesign for good
Design for good
 
Png 492 pec final-presentation
Png 492  pec final-presentationPng 492  pec final-presentation
Png 492 pec final-presentation
 
Smart board project
Smart board projectSmart board project
Smart board project
 
Php obfuscator
Php obfuscatorPhp obfuscator
Php obfuscator
 
General computer security
General computer securityGeneral computer security
General computer security
 
2012 소셜미디어PR론 5조
2012 소셜미디어PR론 5조2012 소셜미디어PR론 5조
2012 소셜미디어PR론 5조
 
PNG 491
PNG 491PNG 491
PNG 491
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
Naspng491
Naspng491Naspng491
Naspng491
 
소셜미디어Pr론 5조 이슈발표
소셜미디어Pr론 5조 이슈발표소셜미디어Pr론 5조 이슈발표
소셜미디어Pr론 5조 이슈발표
 
Presentation1
Presentation1Presentation1
Presentation1
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Root kit

  • 1. Rootkit ? How To Build it Hanafi Ali Jan, ST, C|EH Security Analyst #HaNJiaN
  • 2.
  • 3. Rootkit Rootkit = Super Malware Rootkit = Super Polymorph Rootkit = Super Stealth Process Rootkit = Driver for ALL Platform
  • 4. How To Build ?  • Asm = Master of “Security” • C = Semi Core & Basic Lenguage for it • C# = Controller for it
  • 5. Rootkit Power  • Polimorph • Double Self • Stealth Process • Hidding Access • Keylogging • Installing Considerations • Ghost Tracker • E-mail Reporting • Filter Drivers • Users Hooks • Kernel Hooks • Control Processing
  • 6. Kernel Rootkit in Platform Knark (Linux) Adore (Linux) Plasmoid’s Solaris Loadable (Solaris) Windows NT kernel-level RootKit (Windows)