Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support systems without /proc/kallsyms and unmounted /boot #9

Open
AllanWegan opened this issue Jan 6, 2018 · 3 comments
Open

Support systems without /proc/kallsyms and unmounted /boot #9

AllanWegan opened this issue Jan 6, 2018 · 3 comments

Comments

@AllanWegan
Copy link

My box runs a custom-built Gentoo hardened monolithic kernel with most GRSEC protections enabled (so root doesn't see /proc/kallsyms), but no SELinux or other MAC. It also does not have /boot mounted while running (because i have KASLR enabled).

I already know from Intel's list of affected CPU that my Ivybridge i7 exhibits the behaviour, that is exploited by Meltdown.
But it would be nice to know, whether exploiting the bug on my system would need a tailored exploit in practice or if a further improved generic exploit could do it.

@raphaelsc
Copy link
Owner

I think we'll need to implement ideas presented here: https://gruss.cc/files/kaiser.pdf

It's said that meltdown can be used to bypass KASLR, and from there, we could figure out some places in kernel which would allows us to check it. Remove the dependency on /proc/kallsyms will be a great achievement for this project

@bw0x00
Copy link

bw0x00 commented Jan 7, 2018

Why rely on external information/ bypass KASLR? We could inject a small module which either provides some "strings" to find or it can dump the current address of the syscall table.

Injecting some strings is probably easier than the second idea. I implemented the extraction of the address of the syscall table for a PoC/training rootkit some years ago. Unfortunately the pattern I used to match within the syscall handler is not valid any more. The old code is uploaded here.

@raphaelsc
Copy link
Owner

Very good idea @bw0x00. I'll add it to my list of things to do. I could add a run script that will guide the user through it if it finds /proc/kallsyms cannot be used.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants