IT4510 @ utahtech
The best way to understand what a rootkit does is to play with one. As with all our labs, these are for educational purposes only. Any use of programs for illegitimate use either intentionally or unintentionally could result in failure of the course as well as legal action.
Make sure all this is done on a DISPOSABLE virtual machine. We will break things. The machine we compromised in the previous assignment would be ideal.
Virtualbox users could take a snapshot of your vm so it is easier to rollback after you are done.
Look at submission instructions below for what to turn in
I only tested on the 14.04 install.
Note that within the bin folder of the above extracted directory, there exists a binary called login
. A malicious user would try to replace this rootkitted
version of the login
binary with the login
program found in the /bin
directory of your OS installation.
/bin/login
with the rootkitted version. Prior to doing so, observe what currently happens when you provide an invalid username/password combination to the real login program.
/bin/backup
/bin/login
into /bin/backup
/bin
/bin/login
Observe what happens as you input valid/invalid username/password combinations.
satori
with any of your existing usernames, create a user called ‘user1’ with whatever password you want and try the login using satori
, observe what happens.rewt
/satori
, what happens?/bin
directory.
sudo apt-get install chkrootkit
login
is INFECTEDrkhunter
, see if it can detect more?cp /bin/backup/login /bin/
ls
or du
?# init 3