Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Windows-> Intrusion Detection » Carbonite v1.0

This Directory TOP
Honeynet Security Console 2.6.0.4
Attacker v3.0
SanityCheck 2.01 Build 20130823
Fport
GFI LANguard System Integrity Monitor 3.0
IDS Policy Manager 3.0.1.812
Intrusion Detection System - SAX2 2 build 1.0.0.50
A Everyone s favorite open source IDS
NetWatcher 2000
NetAlert 5.0.0.1
Admin finder
Xintegrity 1.6
MySQLi Dumper
IPv4Trace
IDS Policy Manager 2.0.2
Carbonite v1.0
sqlsus 0.3
Filewatch v1.0
ThreatSentry 3.0.94.0
BufOverA.tar.gz
libebox network ids library 2.0.1
VisualZone 5.7
OSSEC HIDS 2.6
Search

Carbonite v1.0

File Size: 20KB
Developer: http://www.foundstone.com
Description:     Incident Response vs. Loadable Kernel Module Rootkits
Rootkits are collections of commonly trojaned system processes and scripts that automate many of the actions an attacker takes when he compromises a system. Rootkits will trojan ifconfig, netstat, ls, ps, and many other system files to hide an attackers actions from unwary system administrators. They are freely available on the Internet, and one exists for practically every Unix release. The state-of-the-art rootkits are Loadable Kernel Modules (a feature unique to most Unix systems) that hide files, hide processes, and create illicit backdoors on a system. Solaris, Linux, and nearly all Unix flavors support Loadable Kernel Modules. Attacker tools that are Loadable Kernel Modules, or LKMs, have added to the complexity of performing initial response and investigations on Unix systems.

All operating systems provide access to kernel structures and functions through the use of system calls. This means whenever an application or command needs to access a resource the computer manages via the kernel, it will do so through system calls. This is practically every command a user types! Therefore LKM rootkits such as knark, adore, and heroin provide quite a challenge to investigators. The typical system administrator who uses any user space tools (any normal Unix commands) to query running process could overlook critical information during the initial response.

Therefore we created a Linux kernel module called Carbonite, an lsof and ps at the kernel level. Carbonite "freezes" the status of every process in Linuxs task_struct, which is the kernel structure that maintains information on every running process in Linux.
Download:   Carbonite v1.0

 

Sponsor Links

Sponsor Links

Share/Bookmark