Initiating the Connection


Many rootkits set up a communication channel and then listen for commands sent to a specific port, or monitor all network traffic looking for special patterns from a controller. The benefit of these designs is stealth, because just listening is difficult to detect. Unfortunately, this design can be defeated at the corporate firewall by disallowing incoming connections. The rootkit developed in this chapter will bypass this problem by initiating the controller connection during initialization.

Only a few years ago, an outgoing connection initiated during the boot process would have raised suspicions. Even now, an outgoing connection using anything other HTTP-formatted packets from port 80 or 443 can raise suspicions, but today’s software has become very reliant upon the Internet, and checking for updates over the Internet has become so common that outgoing HTTP and HTTPS connections initiated during the boot process shouldn’t raise unwanted suspicion.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net