![]() |
.NET Framework Rootkits
An interesting paper in .Net Reverse
.NET Framework Rootkits: Backdoors inside your Framework November, 2008 Erez Metula Link download: http://www.applicationsecurity.co.il...=161 &mid=555 The main idea: Quote:
http://www.applicationsecurity.co.il...=161 &mid=555 Tool: http://www.applicationsecurity.co.il...=1 61&mid=555 Modul: http://www.applicationsecurity.co.il...=1 61&mid=555 |
Thanks my friend...
nice paper |
Hi Kurapica,
Test this research if you have time. I myself can not believe that it can be bypassed so easily. I will start to test in some next days. More info about this bug Quote:
|
GAC Verifier
I wrote a small tool called GAC Verifier to dectect this art of rootkit.
http://rongchaua.net/tools-mainmenu-36/129-gac-verifier It will scan the GAC Folder and tell us which assembly was not exactly signed. These assembly can be modified to work for the rootkit. Regards. rca. |
yo
nice tool thx checkd my framework ,) thx god not rooooted ,)
|
Nice tool rongchaua, thanks for coding.
|
All times are GMT -4. The time now is 04:44 PM. |
Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2022, Jelsoft Enterprises Ltd.