awesome-linux-rootkits/details/rkduck.md
Ilya V. Matveychikov e938899b43
Update rkduck.md
2018-07-04 13:40:34 +04:00

2.4 KiB

rkduck rootkit details

https://github.com/QuokkaLight/rkduck

Environment

  • x86, x86_64
  • Linux kernel 4.x
  • Debian/Ubuntu, RHEL/CentOS/Fedora

Persistency

Boot-time module loading using OS-specific startup files:

Rootkit module runs forever.sh helper script at the moment of module unloading:

Detection evasion

Rootkit is trying to evade from detection by:

  • hiding rootkit files by name

Management interface

Implemented via in-kernel netlink server (NETLINK_USER) :

Supported commands are:

Altering system behaviour

Hooking of system calls by patching syscall-handlers in sys_call_table[]:

Hiding of files and directories

Filtering of directory entries: