This paper takes an in-depth look into the attack strategies of recent rootkits and analyses what has worked for them. In doing so it highlights some of the profi table attack methodologies from the perspective of kernel rootkits. The discussion in this paper about prediction of the future of stealth attacks is derived from our analysis of multiple rootkits over many years and also based on current trends and some specific techniques. The main aim of this discussion is to help reanalyse rootkit defences and decide what technological improvements (if any) are needed in current and future products to better combat the ever changing stealth threat landscape.
GDT manipulation to hook IDT on 32-bit OShttp://www.mcafee.com/us/resources/repo ... ttacks.pdf
During our discussions with security researcher Xeno Kovah at MITRE Corporation, he mentioned a technique that he is planning to publish soon and is simple enough for rootkits to adopt. It therefore prompted us to discuss it here (with Xeno’s approval) since we think it may be used in the wild in future.
....
Malware Reversing
http://www.malware-reversing.com
http://www.malware-reversing.com