Blog Archives

Paranoia deepens for security people as hardware trojans cloak

Save on DeliciousDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter

I remember being back in college writing little trojans for windows and linux. Hardware trojans troubled one of my lecturers. He had been paranoid, for a great number of years, about the complexity of computer chips and during one such

Save on DeliciousDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter
Tagged with: , , , , , , , , , , ,
Posted in Security

Adding a malicious system call to the Linux kernel – Rootkit

00000244
http://gl.ib.ly/wp-content/uploads/2014/05/00000244-150x150.pngDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter

Introduction Today I am adding a malicious system call to the Linux kernel which will allow the caller to do something they cannot normally do in user mode. When attacking a Linux box our goal is usually to become root;

http://gl.ib.ly/wp-content/uploads/2014/05/00000244-150x150.pngDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter
Tagged with: , , , , , , , ,
Posted in Security