Repositories for Designing BSD Rootkits & FreeBSD Device Drivers

Sounds as fun as smashing my fingers with a 20 pound maul.

You really don't have anything better to do than try and ruin FreeBSD?

Whats next FreeBSD Ransome-ware?

Geez peole who try and tear things down instead of building things up piss me off.
 
Sounds as fun as smashing my fingers with a 20 pound maul.

You really don't have anything better to do than try and ruin FreeBSD?

Whats next FreeBSD Ransome-ware?

Geez peole who try and tear things down instead of building things up piss me off.
I don't think this was their intention. It's just 2 repository of examples from books. This is the wrong place to post in though, in my opinion.

rbranco try Off-Topic.
 
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.
 
Like the KIA hackers assholes that carjacking cheap cars.
Why?
You are ruining our society.

As a locksmith I know that there is no impenetrable lock.
How evil are you to take years to break security systems.
 
Like the KIA hackers assholes that carjacking cheap cars.
Why?
You are ruining our society.
So, who's fault is it? The people that showed how crap that security actually is? KIA for putting crap security on their keyfobs? Or the people that actually carjack someone?

As a locksmith I know that there is no impenetrable lock.
Neither is an unhackable system. But knowing where the faults are does mean you know how you could improve it.

How evil are you to take years to break security systems.
Depends on their intent. (Intention (criminal_law))
 
Sure and child porn is OK because it keep predators at bay.
NOT
Do you really have to mention child porn to backup your argument against someone's exploration of the kernel through examples from BSD books?

Everything ever has exploits, not acknowledging those found only makes those who find (and create) them extremely powerful.
How evil are you to take years to break security systems.
Have you heard of pentesting?
 
I know so little. I think 'standard' ethics says that one should inform in private to secteam about new flaws. But then impose a time period where information goes public, anyway.
This info not going public after this, is a security flaw itself.

"Will the cat succeed in catching the rats, or will the rats outsmart the cat?"
 
Relax... The repository doesn't contain a collection of rootkits. One of the examples is how to hijack a system call. I modified it to hijack close() to do a fsync() before, just to see how it works and how it's done, not because it's such a great idea.
 
Unless I missed something, a rootkit does not enable you to break into someone else's computer. It would need to be installed after gaining access.

There's probably someone reading this that purposely installed a rootkit on their own laptop to "phone home" in case it is ever stolen.
 
Back
Top