Americas

  • United States

Asia

Oceania

roger_grimes
Columnist

New Linux Rootkit detector-Rootkit Profiler

Analysis
Feb 20, 20071 min
Data and Information SecuritySecurity

New Linux rootkit detector. Read and download it here. RKProfiler LX is divided into two parts: a data collection component called "Rootkit Profiler Module" (RKPmod) and a data interpretation component called "Rootkit Profiler Console" (RKPconsole). RKPmod is a kernel module that gets loaded on the system that should be checked for the presence of a kernel rootkit. There are other ways to perform data collection

New Linux rootkit detector.

Read and download it here.

RKProfiler LX is divided into two parts: a data collection component called “Rootkit Profiler Module” (RKPmod) and a data interpretation component called “Rootkit Profiler Console” (RKPconsole).

RKPmod is a kernel module that gets loaded on the system that should be checked for the presence of a kernel rootkit. There are other ways to perform data collection, but currently only this approach is publicly available.

RKPconsole is a userland program that can be used to analyse the collected information.

RKProfiler LX checks the whole kernel code as well as different kernel data sections and cpu registers regarding possible modifications and hidden components:

– Generic kernel code modification

– Syscall table address modification

– Syscall address modification

– Syscall code modification

– Interrupt handler address modification

– Interrupt handler code modification

– Page Fault Handler modification

– Kernel symbol modification

– SYSENTER register modification

– Virtual File System function pointer modification

– Hidden processes and threads

– Hidden kernel modules

roger_grimes
Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

More from this author