Displaying 20 results from an estimated 5000 matches similar to: "Design Decision for KVM based anti rootkit"
2018 Jun 18
1
Design Decision for KVM based anti rootkit
Shortly after I sent the first email, we found that there is another
way to achieve this kind of communication, via KVM Hypercalls, I think
they are underutilised in kvm, but they exist.
We also found that they are architecture dependent, but the advantage
is that one doesn't need to create QEMU<-> kvm interface
So from our point of view it is either have things easily compatible
with
2018 Jun 18
0
Design Decision for KVM based anti rootkit
On 16.06.2018 13:49, Ahmed Soliman wrote:
> Following up on these threads:
> - https://marc.info/?l=kvm&m=151929803301378&w=2
> - http://www.openwall.com/lists/kernel-hardening/2018/02/22/18
>
> I lost the original emails so I couldn't reply to them, and also sorry
> for being late, it was the end of semester exams.
>
> I was adviced on #qemu and
2018 Jun 19
0
Design Decision for KVM based anti rootkit
On 19 June 2018 at 19:37, David Vrabel <david.vrabel at nutanix.com> wrote:
> It's not clear how this increases security. What threats is this
> protecting again?
It won't completely protect prevent rootkits, because still rootkits
can edit dynamic kernel data structures, but it will limit what
rootkits damage to only dynamic data.
This way system calls can't be changed, or
2008 Jan 13
3
Anti-Rootkit app
Hi all,
I need to install an anti-rootkid in a lot of servers. I know that
there're several options: tripwire, aide, chkrootkit...
?What do you prefer?
Obviously, I have to define my needs:
- easy setup and configuration
- actively developed
--
Thanks,
Jordi Espasa Clofent
2018 Jul 19
8
Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM
Hi,
This is my first set of patches that works as I would expect, and the
third revision I sent to mailing lists.
Following up with my previous discussions about kernel rootkit mitigation
via placing R/O protection on critical data structure, static data,
privileged registers with static content. These patches present the
first part where it is only possible to place these protections on
memory
2018 Jul 19
8
Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM
Hi,
This is my first set of patches that works as I would expect, and the
third revision I sent to mailing lists.
Following up with my previous discussions about kernel rootkit mitigation
via placing R/O protection on critical data structure, static data,
privileged registers with static content. These patches present the
first part where it is only possible to place these protections on
memory
2018 Jul 20
4
Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM V4
Here is change log from V3 To V4:
- Fixing spelling/grammar mistakes suggested by Randy Dunlap
- Changing the hypercall interface to be able to process multiple pages
per one hypercall also suggested by Randy Dunlap. It turns out that
this will save lots of vmexist/memory slot flushes when protecting many
pages.
[PATCH RFC V4 1/3] KVM: X86: Memory ROE documentation
[PATCH RFC V4 2/3] KVM:
2015 Feb 04
4
Another Fedora decision
On 02/04/2015 02:08 PM, Lamar Owen wrote:
>
> 3.) Attacker uses a large graphics card's GPU power, harnessed with
> CUDA or similar, to run millions of bruteforce attempts per second on
> the exfiltrated /etc/shadow, on their computer (not yours).
> 4.) After a few hours, attacker has your password (or at least a
> password that hashes to the same value as your password),
2010 Sep 30
6
ClamAV thinks Wine contains a rootkit?
Anyone wanna explain why ClamAV thinks Wine has a rootkit in it?
It finds "mountmgr.sys" and "usbd.sys" as "BC.Heuristics.Rootkit.B"
This is not altered Wine.. or even used... but it happens just pure straight up compile from source Wine even if its never been ran.... its finding them in the fakedlls folder.
I have not tried on Linux, only on Mac OS X, using the
2008 Feb 11
0
Remember the unknown rootkit problem previously reported?
If the attacker could get a shell, the attacker could have used this
local root exploit to get the necessary privileges to install the rootkit.
One reason why there seem to be few RHEL reports is that RHEL5 is not
that widely available yet but lots of vulnerable Fedora/Debian
installations are available.
2008 Sep 01
1
How to check for rootkit, troians etc in backed up files?
Hi,
there is a remote (VPS) Centos 4.2 server which *may* have been
compromised. Reinstalling everything from scratch isn't a problem, it
may even be an occasion to improve a few things, the question is
another.
There are backups of necessary shell script, ASCII configuration files
and more or less important email (maildir format, if it matters)
including messages with binary attachments in
2013 Feb 21
3
SSHD rootkit in the wild/compromise for CentOS 5/6?
Hello everyone,
I hope you are having a good day. However, I am concerned by this:
https://isc.sans.edu/diary/SSHD+rootkit+in+the+wild/15229
Has anyone heard yet what the attack vector is, if 5.9 and 6.4 are
affected, and if a patch is coming out?
Thanks!
Gilbert
*******************************************************************************
Gilbert Sebenste
2003 Aug 22
0
rootkit
I ran chkrootkit and this is what I got.
should I worry or is this normal?
I'm running 4.8
thanks.
Checking `wted'... 3 deletion(s) between Sat Jun 26 18:10:21 2027 and Sun
Mar 24 04:27:12 2024
4 deletion(s) between Sun Mar 24 04:27:12 2024 and Sun Mar 24 04:27:12 2024
5 deletion(s) between Sun Mar 24 04:27:12 2024 and Sun Mar 24 04:27:12 2024
1 deletion(s) between Sun Mar 24 04:27:12
2003 Mar 30
2
Bindshell rootkit
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Ok...did some checking. I forgot to mention that I killed dead syslogd. Not just a -HUP but an actual kill and restarted. I did this several times. I was trying to get something else to work.
Anyway, I killed it again this morning and restarted. The infect message went away immediately.
Could this have been the problem?
-
2001 Jun 25
1
Apparent SSH-1.2.27 Rootkit
Hello,
I found this lurking around the web, and thought people who are
running SSH-1.2.27 might be interested.
--
Kevin Sindhu <kevin at tgivan dot com>
Systems Engineer
TGI Technologies Inc. Tel: (604) 872-6676 Ext 321
107 E 3rd Avenue Fax: (604) 872-6601
Vancouver,BC V5T 1C7
Canada.
-------------- next part --------------
Welcome Root Kit SSH distribution v5.0 (by Zelea)
This
[Bug 1469] New: Should sshd detect and reject vulnerable SSH keys (re: Debian DSA-1571 and DSA-1576)
2008 May 24
9
[Bug 1469] New: Should sshd detect and reject vulnerable SSH keys (re: Debian DSA-1571 and DSA-1576)
https://bugzilla.mindrot.org/show_bug.cgi?id=1469
Summary: Should sshd detect and reject vulnerable SSH keys (re:
Debian DSA-1571 and DSA-1576)
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
2003 Mar 31
1
dovecot-0.99.8.1 @ old redhat6.2 box
Hi
I have some odd problem with running dovecot.
Program dies with message in maillog:
Mar 31 21:04:02 test-box dovecot: Dovecot starting up
Mar 31 21:04:04 test-box dovecot: execv(imap-login) failed: Resource temporarily unavailable
Mar 31 21:04:04 test-box dovecot: execv(imap-login) failed: Resource temporarily unavailable
Mar 31 21:04:04 test-box dovecot: Login process died too early -
2003 Feb 02
1
server crash when running rsync --daemon
Hello,
We are running rsync version 2.5.6 on a slackware (version 9.0-beta) linux
server. This server is basicly a ftp server (96 sessions max) and a rsync
(rsync --daemon) server (25 connections max).
The server keeps on crashing and after many ours of hardware/software trouble
shooting the crashes appear to be related to the rsync processes.
If I turn off rsync --daemon the server runs
2008 Jan 29
5
Unknown rootkit causes compromised servers
Here is the applicable article:
http://www.linux.com/feature/125548
There are links in the above article that explain tests for the system
and what is currently known about the rootkit.
Apparently initial access is NOT via any vulnerability but just guessed
root passwords.
There are currently 2 methods to see if you are infected:
1. In some cases, the root kit causes you to not be able to
2015 Jan 27
3
CVE-2015-0235 - glibc gethostbyname
Saw this on the Exim List:-
From: Tony Finch <dot--at-- at dotat.at>
Subject: [exim] CVE-2015-0235 - glibc gethostbyname remotely exploitable
via exim
Date: Tue, 27 Jan 2015 17:33:45 +0000
"The Exim mail server is exploitable remotely if configured to perform
extra security checks on the HELO and EHLO commands ("helo_verify_hosts"
or "helo_try_verify_hosts"