WindowsRegistryRootkit

内核rootkit,它存在于Windows注册表值数据中。(Kernel rootkit, that lives inside the Windows registry values data.)

Github星跟踪图


Kernel rootkit, that lives inside the Windows registry value data.
By Oleksiuk Dmytro (aka Cr4sh)

http://twitter.com/d_olex
http://blog.cr4.sh
cr4sh0@gmail.com


Rootkit uses the zero day vulnerability in win32k.sys (buffer overflow in function win32k!bInitializeEUDC()) to get the execution at the OS startup.

Features:

  • NDIS-based network backdoor (+ meterpreter/bind_tcp).

  • In order to avoid unknown executable code detection it moves itself in the memory over discardable sections of some default Windows drivers.

  • Completely undetectable by public anti-rootkit tools.

  • Working on Windows 7 (SP0, SP1) x86.

diagram

This rootkit was originally presented at the ZeroNights 2012 conference during my talk.
See the slides and videos for more information: https://raw.githubusercontent.com/Cr4sh/blog/master/windows-registry-rootkit/Applied-anti-forensics.pdf

主要指标

概览
名称与所有者Cr4sh/WindowsRegistryRootkit
主编程语言C
编程语言Python (语言数: 5)
平台Windows
许可证
所有者活动
创建于2013-01-04 13:14:33
推送于2017-10-08 09:36:19
最后一次提交2017-10-08 12:36:01
发布数0
用户参与
星数492
关注者数43
派生数146
提交数11
已启用问题?
问题数0
打开的问题数0
拉请求数0
打开的拉请求数0
关闭的拉请求数0
项目设置
已启用Wiki?
已存档?
是复刻?
已锁定?
是镜像?
是私有?