Honest Ways of Hacking

With root privileges, there is no problem in penetrating the kernel. For example, the hacker can write a custom LKM and load it using the insmod command. LKMs are easy to write (in contrast to Windows drivers). Examples of ready-to-use LKMs can be found in Chapter 13 . In addition, Chapter 13 describes the methods of concealing LKMs from a vigilant administrator.

There is another variant. The kernel mounts two pseudodevices ” /dev/mem (physical memory before virtual translation) and /dev/kmem (physical memory after virtual translation). Having the root privileges, the hacker can manipulate the kernel code and data.

Briefly, the entire problem consists of obtaining the root. Proceeding legally, this is impossible ! Linux supports the entire complex of protection and security measures. However, the protection system has lots of holes that make it similar to a colander. Hackers actively use these holes.



Shellcoder's Programming Uncovered
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net