You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 18, 2024. It is now read-only.
Hello! I want to thank you for very cool and useful module to detect hidden kernel modules. I'm making a project to scan malware and rootkit on Linux (the scope is to replace rkhunter and chkrootkit which mostly use absolute file and dir paths check). I would like to reuse your code in my project for the LKM modules (which can't be trusted by user's land applications). I have some questions:
I didn't do kernel module programming. And readme didn't have explaination so I would like to ask to understand the method this module uses. Is this some kind of check kernel's symbols and compare to find hidden modules?
Let say that attacker added the module to the system. Is there any possible way to find the location of the file?
I am thinking about a possible way to unload the rootkit's module and possibly allow a scanner (I'm using Yara) to scan with rules / signatures. Do you think it can be done, considering rootkit's module blocks applications from reading the module file to hide itself.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hello! I want to thank you for very cool and useful module to detect hidden kernel modules. I'm making a project to scan malware and rootkit on Linux (the scope is to replace rkhunter and chkrootkit which mostly use absolute file and dir paths check). I would like to reuse your code in my project for the LKM modules (which can't be trusted by user's land applications). I have some questions:
The text was updated successfully, but these errors were encountered: