Project Athena
  • Welcome
  • Module 00 - Mindset
    • Introduction
    • Lectures
      • Introduction to the Offensive Security Mindset
      • Curiosity, Creativity, Persistence
      • Maintaining a Healthy Mindset
  • Module 01 - Ethics and Legal
    • Introduction
    • Lectures
      • Hacker Ethics
      • Legal Framework
      • Legal Framework in Germany
  • Module 02 - Reconnaissance
    • Introduction
    • Lectures
      • Introduction to Reconnaissance
      • Information Gathering
      • Open Source Intelligence (OSINT)
      • Social Engineering
      • Search Engines for Reconnaissance
  • Module 03 - Penetration Testing
    • Introduction
  • Module 04 - Web Security
    • Introduction
    • Lectures
      • Introduction to Web
      • Security Features of the Browser
      • Client Side Vulnerabilities
      • Server Side Vulnerabilities
  • Module 05 - Hacking with Python
    • Introduction
  • Module 06 - Assembly
    • Introduction
  • Module 07 - Reverse Engineering
    • Introduction
  • Module 08 - Binary Exploitation
    • Introduction
  • Module 09 - Forensics
    • Introduction
  • Module 10 - Metasploit
    • Introduction
  • Module 11 - Linux and Server Security
    • Introduction
  • Module 12 - Windows and AD Security
    • Introduction
  • Module 13 - Blue Teaming
    • Introduction
    • Lectures
      • Overview
      • Firewalls
      • Intrusion Detection and Prevention Systems
      • Incident Response
      • Security Information and Event Management (SIEM)
  • Module 14 - Cryptography
    • Introduction
    • Lectures
      • What is Cryptography?
      • Symmetric Cryptography
      • Asymmetric Cryptography
      • Cryptographic Attacks
  • Module 15 - Password Cracking
    • Introduction
  • Module 16 - Hardware Hacking
    • Introduction
  • Module 17 - Cloud Security
    • Introduction
    • Lectures
      • Overview of Cloud Security
      • Comparison of Server Types: Cloud, Dedicated, and Shared Servers
      • User and Permission Management in Cloud Platforms
      • Containerization Overview:
      • Cloud Computing Security Concepts:
      • Secure DevOps in the Cloud
      • Exploring Key Certifications and Standards in On-Premises and Cloud Security
  • Module 18 - Mobile Security
    • Introduction
  • Module 19 - Wireless Security
    • Introduction
    • Lectures
      • The Wireless Network Architecture
      • WiFi Security Fundamentals
      • WiFi Authentication and Encryption Mechanisms
      • WiFi Attack Vectors
      • Wireless Penetration Testing Tools and Techniques
      • Best Practices for Securing Wireless Networks
  • Module 20 - RATs and Rootkits
    • Introduction
    • Lectures
      • Remote Access Trojans
      • What is a Rootkit?
  • Module 21 - AI in offensive Security
    • Introduction
  • Module 22 - Social Engineering
    • Introduction
    • Lectures
      • Introduction to Social Engineering
      • Types of Social Engineerings Attacks
      • Stages of a Social Engineering Attack
      • Psychological Principles behind Social Engineering
      • Tools and Techniques for Social Engineering
      • Prevention and Defense against Social Engineering Attacks
Powered by GitBook
On this page
  1. Module 20 - RATs and Rootkits
  2. Lectures

What is a Rootkit?

Is a Malware that is designed to give the threat actor control over a computer network or application. Once the malware is activated it sets up a backdoor exploit which could come with additional malware such as:

  • ransomware, bots, keyloggers or trojans.

"Rootkits can stay undetected for up to several years."


Known Rootkit Types:

Firmware Rootkits:

  • UEFI Rootkit

  • Cloaker

  • VGA rootkit

Kernel mode rootkits:

  • Spicy Hot Pot

  • FU

  • Knark

Kernel mode rootkits:

  • Stoned Bootkit

  • Olmasco

  • Rovnix

Kernel mode rootkits:

  • Vanquish

  • Hacker Defender

  • Aphex


Rootkit example: Spicy hot pot

Spicy Hot Pot malware uploads users' memory dumps and adds a local update feature. To enhance stealth, it introduces two kernel-mode drivers during infection, a step beyond typical browser hijackers.

These malicious drivers perform functions that can:

  • Intercept and modify user input and output requests

Describe the common features and functionalities of RATs:

Because a RAT provides a backdoor and enables administrative control, it empowers the intruder to do almost anything on the targeted computer, including the following:

  • Access confidential information, such as credit card and Social Security numbers.

  • Activate a system's webcam and record video.

  • Take screenshots.

  • Format drives.

  • Delete, download or alter files and file systems.

(see Yasar 2022)

So generally it can be said that RATs are designed to give the User complete control over the victim's computer. Things like the activation of webcams or Keyloggers are part of Spyware, although the manipulation of files makes it a potential Ransomware. Because of all these facts it's obvious that RATs have a wide variety of potential use cases.

Describe the common features and functionalities of Rootkits:

  • Privilege Escalation:

  • Rootkits aim to escalate their privileges to gain the highest level of access on a system, such as root or administrator privileges.

  • By doing so, they can control all aspects of the operating system and compromise the security of the entire system.

  • Persistence:

  • Rootkits are persistent, meaning they are designed to survive system reboots and remain active on the compromised system.

  • They often use techniques like modifying system files or registry entries to ensure that they are loaded during the system startup.

  • Backdoor Functionality:

  • Rootkits frequently include backdoor functionality, allowing remote attackers to access the compromised system without being detected.

  • This backdoor access can be used for various malicious purposes, such as stealing sensitive information, launching attacks, or turning the compromised system into a part of a botnet.

  • This may involve hiding files and processes, manipulating system logs, or using rootkit-specific mechanisms to conceal their activities.

  • User-mode Rootkits:

  • Other rootkits operate in user mode, making them less powerful but also less detectable.

  • User-mode rootkits may achieve their goals by modifying user-level processes and system libraries.

  • Anti-Antivirus Techniques:

  • Rootkits often include mechanisms to evade detection by antivirus and security software.

  • This may involve actively monitoring and responding to security software scans or manipulating system components to avoid detection.

Analyze real-world Rootkit attacks and identify the techniques used by attackers

Some of these real rootkit attacks summed up:

ZeroAccess (or ZeroAccess Rootkit):

  • ZeroAccess is a sophisticated rootkit that primarily functions as a click-fraud and Bitcoin mining botnet. It often spreads through drive-by downloads and social engineering techniques. Its complexity and ability to avoid detection have made it a significant threat.

Hit Kit:

  • As of my last knowledge update in January 2022, "HitKit" doesn't refer to a well-known rootkit or malware. It's possible that it's a new term or a specific reference within a certain context.

Ebury:

  • Ebury is not a rootkit but rather a sophisticated backdoor Trojan designed for Linux servers. It is used by attackers to gain unauthorized access and control over Linux systems.

Flame:

  • Flame, also known as Flamer or sKyWIper, is a highly complex and sophisticated cyber espionage malware that targeted primarily Middle Eastern countries. It had various capabilities, including data theft, audio recording, and taking screenshots.

Necurs:

  • Necurs is not a rootkit but a notorious botnet that has been involved in various cybercriminal activities, including spam email campaigns, distributing ransomware, and participating in distributed denial-of-service (DDoS) attacks.

Implement and use tools to detect and defend against Rootkits

To counter rootkit malware, organizations should implement advanced endpoint protection solutions using technologies like artificial intelligence, telemetry, and real-time response capabilities. These solutions go beyond traditional measures and include continuous monitoring of endpoint BIOS to prevent kernel rootkit attacks.

PreviousRemote Access TrojansNextIntroduction

Last updated 1 year ago

Enable the malicious actor to update the malware any way they wish

Monitor user behavior, such as keystrokes, through and spyware.

Distribute viruses and malware, as well as launch

keyloggers
ransomware