Jump to content
gogusan

Ncom Libcall Rootkit (interesant)

Recommended Posts

Download: Ncom Libcall Hijacking Rootkit ? Packet Storm

For every incoming connection on any port, the source port is checked. If it is in the 61001 - 61010 range, the connection is taken over by the rootkit. Upon taking over, the rootkit asks for a password ("kaka", in this specific case), and then drops a root shell:
This rootkit can be hard to detect, as it requires the attacker to be doing something on the system at the very moment you’re checking in order to be detected by normal means (see: unhide, rkhunter, chkrootkit, etc)
This way of backdooring is very smart, because any open port can be used to access the rootkit.

Unlike other notable examples (such as suckit), a firewall wouldn’t deny the attacker access to the rooted box.

cititi documentatia. foarte interesant :)

Edited by gogusan
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...