WindowsRegistryRootkit

内核rootkit,它存在于Windows注册表值数据中。(Kernel rootkit, that lives inside the Windows registry values data.)

Github星跟蹤圖


Kernel rootkit, that lives inside the Windows registry value data.
By Oleksiuk Dmytro (aka Cr4sh)

http://twitter.com/d_olex
http://blog.cr4.sh
cr4sh0@gmail.com


Rootkit uses the zero day vulnerability in win32k.sys (buffer overflow in function win32k!bInitializeEUDC()) to get the execution at the OS startup.

Features:

  • NDIS-based network backdoor (+ meterpreter/bind_tcp).

  • In order to avoid unknown executable code detection it moves itself in the memory over discardable sections of some default Windows drivers.

  • Completely undetectable by public anti-rootkit tools.

  • Working on Windows 7 (SP0, SP1) x86.

diagram

This rootkit was originally presented at the ZeroNights 2012 conference during my talk.
See the slides and videos for more information: https://raw.githubusercontent.com/Cr4sh/blog/master/windows-registry-rootkit/Applied-anti-forensics.pdf

主要指標

概覽
名稱與所有者Cr4sh/WindowsRegistryRootkit
主編程語言C
編程語言Python (語言數: 5)
平台Windows
許可證
所有者活动
創建於2013-01-04 13:14:33
推送於2017-10-08 09:36:19
最后一次提交2017-10-08 12:36:01
發布數0
用户参与
星數492
關注者數43
派生數146
提交數11
已啟用問題?
問題數0
打開的問題數0
拉請求數0
打開的拉請求數0
關閉的拉請求數0
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?