![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() An interesting paper in .Net Reverse
.NET Framework Rootkits: Backdoors inside your Framework November, 2008 Erez Metula Link download: http://www.applicationsecurity.co.il...=161 &mid=555 The main idea: Quote:
http://www.applicationsecurity.co.il...=161 &mid=555 Tool: http://www.applicationsecurity.co.il...=1 61&mid=555 Modul: http://www.applicationsecurity.co.il...=1 61&mid=555
__________________
My site: http://rongchaua.net |
#2
|
|||
|
|||
![]() Thanks my friend...
nice paper
__________________
Life can only be understood backwards but It must be read forwards. |
#3
|
|||
|
|||
![]() Hi Kurapica,
Test this research if you have time. I myself can not believe that it can be bypassed so easily. I will start to test in some next days. More info about this bug Quote:
__________________
My site: http://rongchaua.net Last edited by rongchaua : 03-12-2009 at 08:16 AM. |
#4
|
|||
|
|||
![]() I wrote a small tool called GAC Verifier to dectect this art of rootkit.
http://rongchaua.net/tools-mainmenu-36/129-gac-verifier It will scan the GAC Folder and tell us which assembly was not exactly signed. These assembly can be modified to work for the rootkit. Regards. rca.
__________________
My site: http://rongchaua.net |
#5
|
|||
|
|||
![]() nice tool thx checkd my framework ,) thx god not rooooted ,)
|
#6
|
|||
|
|||
![]() Nice tool rongchaua, thanks for coding.
__________________
Life can only be understood backwards but It must be read forwards. |