Linux Stealth Rootkit Hunting Presentation
文章介绍了在Oslo冷响应会议上关于Linux隐秘Rootkit狩猎的技术,重点分析了中国/朝鲜Rootkit,并通过数据泄露、不一致回答和系统影响三个关键领域指导如何利用简单命令行工具检测多种Rootkit和恶意软件。建议使用Sandfly进行大规模检测和深入分析。 2025-10-9 05:42:57 Author: sandflysecurity.com(查看原文) 阅读量:13 收藏

Sandfly Blog

09 October 2025

Presentations

Below is our presentation from the Oslo Cold Incident Response Conference 2025 that covered hunting for Linux stealth rootkits with command line tools:

Linux Stealth Rootkit Hunting Presentation

This presentation covers techniques for rapidly investigating a host to see if it is running particular types of Loadable Kernel Module (LKM) rootkits trying to evade detection. This presentation covered the recently disclosed China/Korean rootkit by Phrack magazine that we discuss below, but applies to other rootkit styles as well:

Leaked China/North Korean Stealth Rootkit Analysis

This presentation covers general advice on hunting for threats hiding on Linux by focusing on three critical areas:

1) Data leaks

2) Inconsistent answers

3) System impacts

Applying these principles with simple command line tools on Linux can reveal a wide variety of rootkits and evasive malware.

While these methods work great for one-off investigations, we recommend you use Sandfly to do this at scale and also to get access to much deeper malware decloaking tools. Please contact us to find out more or get a license today.

Links

https://phrack.org/issues/72/7_md#article

https://sandflysecurity.com/blog/leaked-north-korean-linux-stealth-rootkit-analysis

https://github.com/sandflysecurity

https://docs.kernel.org/admin-guide/tainted-kernels.html



文章来源: https://sandflysecurity.com/blog/linux-stealth-rootkit-hunting-presentation
如有侵权请联系:admin#unsafe.sh