hi,
Lojack features are known since years in forensic world,and covered for BlackHat2009 by the Corelabs team which provides a good summary on this page:
http://blog.coresecurity.com/2009/08/11 ... h-defense/
It is now technically possible to develop a kind of anti-forensic rootkit that will resist to a format or hard disk replacement (hide itself in the BIOS and HPA).
The features will be complete with live memory analysis resistance and covert cannels connections.
Unlike MBR rootkits family, there is currently no risk to see mass infection and botnet.
How it works: http://www.absolute.com/Shared/FAQs/L4L ... .sflb.ashx
http://blog.absolute.com/tag/lojack-for-laptops/
Defeating lojack (might be outdated): http://cryptome.org/lojack-hack.pdf
Before trying (if it is not already embended) it, check the Bios compatibility: http://www.absolute.com/en/products/bio ... ility.aspx
Anti-forensic rootkit: http://www.slideshare.net/amiable_india ... c-rootkits
Anti-forensic:the rootkit connection: https://www.blackhat.com/presentations/ ... -PAPER.pdf
"Rootkit technology" has already been used in software piracy and gaming solutions (be evil to combat the evil?).
Rgds
Lojack features are known since years in forensic world,and covered for BlackHat2009 by the Corelabs team which provides a good summary on this page:
http://blog.coresecurity.com/2009/08/11 ... h-defense/
It is now technically possible to develop a kind of anti-forensic rootkit that will resist to a format or hard disk replacement (hide itself in the BIOS and HPA).
The features will be complete with live memory analysis resistance and covert cannels connections.
Unlike MBR rootkits family, there is currently no risk to see mass infection and botnet.
How it works: http://www.absolute.com/Shared/FAQs/L4L ... .sflb.ashx
http://blog.absolute.com/tag/lojack-for-laptops/
Defeating lojack (might be outdated): http://cryptome.org/lojack-hack.pdf
Before trying (if it is not already embended) it, check the Bios compatibility: http://www.absolute.com/en/products/bio ... ility.aspx
Anti-forensic rootkit: http://www.slideshare.net/amiable_india ... c-rootkits
Anti-forensic:the rootkit connection: https://www.blackhat.com/presentations/ ... -PAPER.pdf
"Rootkit technology" has already been used in software piracy and gaming solutions (be evil to combat the evil?).
Rgds
Security? Yeah But Well: http://www.ouaismaisbon.ch/ )