Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Linux Rootkit
- A simple Linux kernel rootkit written for fun, not evil.
- Functionality
- -The rootkit can do the following:
- -Grant root privileges to a userland process
- -Hide process by PID
- -Unhide a previously hidden process by PID
- -Hide files or directories by their name
- -Unhide previously hidden files or directories
- -Hide itself
- -Unhide itself
- -Protect against being unloaded by the user
- -Disable the unload protection
- Supported Platforms
- The rootkit was tested to work on Linux kernels 2.6.32-38 and 4.4.0-22 as provided by Ubuntu in Ubuntu 10.04.4 LTS and Ubuntu 16.04 LTS respectively, but it should be very easy to port to kernels in-between, as well as newer ones.
- There is some architecture-specific code in the rootkit which is implemented only for x86 and x86-64 architectures. That's the code for finding the system call table, disabling write-protected memory, and one of the two function hooking methods. It should be very easy to port to a new architecture, and some of this code is not strictly necessary for the rootkit to function, e.g. the non-portable hooking method could be stripped away, though you must be a very boring person if you are willing to miss on the fun of function hooking that overwrites machine code of the target kernel function such that it calls our hook function instead.
- The rootkit was tested only with 1 CPU core, so it may or may not function correctly on a multi-core system. It likely won't run very well on a multi-core system as the rootkit was written expecting there to be only 1 thread executing anything at any given time, so it lacks atomic writes/reads and mutexes around list data structures.
- Build
- Setting Up Environment
- Warm up your VM of choice.
- Grab and install the desired Ubuntu image:
- Kernel / arch x86 x86-64
- 2.6.32 Ubuntu 10.04.4 i386 (694M) [torrent] [iso] Ubuntu 10.04.4 amd64 (681M) [torrent] [iso]
- 4.4.0 Ubuntu 16.04 i386 (647M) [torrent] [iso] Ubuntu 16.04 amd64 (655M) [torrent] [iso]
- For Ubuntu 10.04, patch the package repository address:
- sed -i -re 's/([a-z]{2}\.)?archive.ubuntu.com|security.ubuntu.com/old-releases.ubuntu.com/g' /etc/apt/sources.list
- Install a compiler, Linux headers, and all other things required for us to build the rootkit:
- apt-get update
- apt-get install build-essential
- Make sure not to call apt-get upgrade, as it would update the kernel, when the rootkit was tested only on the pre-installed kernel version.
- Actual Building
- make
- Use
- Load rootkit:
- insmod rootkit.ko
- Use rootkit:
- $ ./client --help
- Usage: ./client [OPTION]...
- Options:
- --root-shell Grants you root shell access.
- --hide-pid=PID Hides the specified PID.
- --unhide-pid=PID Unhides the specified PID.
- --hide-file=FILENAME Hides the specified FILENAME globally.
- Must be a filename without any path.
- --unhide-file=FILENAME Unhides the specified FILENAME.
- --hide Hides the rootkit LKM.
- --unhide Unhides the rootkit LKM.
- --help Print this help message.
- --protect Protects the rootkit from rmmod.
- --unprotect Disables the rmmod protection.
- Unload rootkit:
- ./client --unhide
- ./client --unprotect
- rmmod rootkit.ko
- YOU ARE OUT OF YOUR MIND TO PUBLICY RELEASE SUCH MALICIOUS CODE ONLINE, YOU ARE ARMING SCRIPT KIDDIES WITH NUKES!!!1
- Not really, there are many articles online on how to write a Linux rootkit with the full source code provided, not to mention the countless GitHub repositories.
Add Comment
Please, Sign In to add comment