dslreports logo
Search similar:


uniqs
37696

PageTurner
Premium Member
join:2004-08-16
US

PageTurner to bcool

Premium Member

to bcool

Re: RSA: Microsoft on 'rootkits': Be afraid, be ve

Try the index page.

»www.rootkit.com/index.php

bcool
Premium Member
join:2000-08-25

bcool

Premium Member

said by PageTurner:

Try the index page.

»www.rootkit.com/index.php
Thank you!

jig
join:2001-01-05
Hacienda Heights, CA

jig to DaveDude

Member

to DaveDude

Re: RSA: Microsoft on 'rootkits': Be afraid, be very


my favorite

it all comes down to this.
lgkahn7
Premium Member
join:2005-02-15
Londonderry, NH

lgkahn7

Premium Member

I've never understood why internet explore allows software to install to the registry or write no files without prompting you.. why is there no prompt period or an option to disallow any registry change etc....

regardless of what security level you have set
your moderator at work
astirusty
Premium Member
join:2000-12-23
Henderson, NV

1 edit

astirusty to PageTurner

Premium Member

to PageTurner

Re: RSA: Microsoft on 'rootkits': Be afraid, be ve

said by PageTurner:


Try the index page.

»www.rootkit.com/index.php
Not trying to hack-anybody-off: But have any of these anti-rootkit tools been vetted by independent trusted sources?
I could see how a rootkit hacker could have hacked into a site and added their own code to one of these tools to where it ignores the hacker's own rootkit.

antdude
Zombie Ant
Premium Member
join:2001-03-25
US

antdude to jig

Premium Member

to jig
said by jig:

it all comes down to this.
Funny! I love it!
psloss
Premium Member
join:2002-02-24

psloss to spy1

Premium Member

to spy1
said by spy1:

Most are pretty esoteric for the average user (me) and/or require scans to be run on the computer in question by another computer known to be clean.
Not another computer, necessarily -- though that will work. Rootkits pervert the operating system software, so the infected OS needs to be scanned from another operating system known to be clean.

I agree, though, that no one has yet made it easy enough for home Windows users to detect and clean rootkits, but many of the pieces are there.

Going back to Steve's analogy, ("I'm starter than the guy who rooted my box.") the problem I still see here if kernel and even usermode rootkits abound is: "Am I patient enough to reinstall all the software on my Dell?" (As an example.) Which might lead into the question "Am I obligated to reinstall all the software on my Dell?"

Hmmm...that kind of tangentially touches on subjects in the long thread on the concept of computer operator negligence, too.

Sorry.

Philip Sloss

MeDuZa
join:2003-06-13
Austria

MeDuZa to EGeezer

Member

to EGeezer
said by EGeezer:

New release (2.x) of PF ...

With this tool you should be able to detect even the newest versions of such rootkits like: Hacker Defender, APX, Vaniquish, He4Hook, and many more...
Bypassing PatchFinder 2

Martinus
Premium Member
join:2001-08-06
EU

Martinus to psloss

Premium Member

to psloss
said by psloss:

Rootkits pervert the operating system software, so the infected OS needs to be scanned from another operating system known to be clean.
Would booting from a WinPE, BartPE or Knoppix CD do the trick?
psloss
Premium Member
join:2002-02-24

psloss to znide

Premium Member

to znide
said by znide:

In ring 0, you can do an awful lot of damage to a computers hardware as well. This is what I'm afraid of more then the other bullshit. To give you an idea of how powerful ring0 is, you can turn off a CPU fan from ring 0.
Or do something like the Witty worm, which was just user mode...

The thing about this is, though, that the bad guys pretty much want to use your computer and its running operating system, not trash it. There's no financial opportunity for the bad guys with a trashed computer, because after the system is trashed, even they can't use it.

Philip Sloss
psloss

psloss to Martinus

Premium Member

to Martinus
said by Martinus:
said by psloss:

Rootkits pervert the operating system software, so the infected OS needs to be scanned from another operating system known to be clean.
Would booting from a WinPE, BartPE or Knoppix CD do the trick?
Yes, from those you could scan an infected operating system. (And even attempt to clean it.) You still need to provide the scanner, though there have been a few distributions mentioned recently that do just that...

(Only the latter two are really options for home users.)

Philip Sloss

Martinus
Premium Member
join:2001-08-06
EU

Martinus

Premium Member

said by psloss:

Yes, from those you could scan an infected operating system. (And even attempt to clean it.)
Thanks. And this - attempting cleaning the system - may very well be impossible unless you have the right tools for it, I guess.

So, are there any reliable tools to deal with Windows rootkits? What role do AVs - KAV, Mcafee, etc - play in this scenario assuming you boot from a clean environment? Will they be able to detect the rootkit and clean the infected system?

Vampirefo
Premium Member
join:2000-12-11
Huntington, WV

Vampirefo

Premium Member

Kav, McAfee and any top AV detects the rootkit many ways to remove the rootkit, here is another posted here on dslreports on how to find them.

»Re: rootkit

Anything installed on a computer can be removed, it's that simple.

Steve
I know your IP address

join:2001-03-10
Tustin, CA

Steve

said by Vampirefo:

Anything installed on a computer can be removed, it's that simple.
And any credibility you have ever had in this forum has been removed too, it's that simple.
psloss
Premium Member
join:2002-02-24

psloss to Martinus

Premium Member

to Martinus
said by Martinus:

So, are there any reliable tools to deal with Windows rootkits? What role do AVs - KAV, Mcafee, etc - play in this scenario assuming you boot from a clean environment? Will they be able to detect the rootkit and clean the infected system?
Well, this just brings us back to the question of whether one should even bother to clean a rootkit.

Thinking about this more, here's my pet example again: a Microsoft-sanctioned WinPE-based boot CD-R in the hands of consumers that had Microsoft's anti-spyware software on it, could get an IP address, and could do some limited browsing. After booting, the system could be taken to an online AV scanner (like TrendMicro's) and also to update the anti-spyware signatures. If those can scan and clean the offline operating system, does that theoretically mean the system is equivalently clean to one in which malware is "cleaned" by software from within the "normal" OS install?

This would change the question Steve asked to: "Is the 'widget' division (I don't know the name, or even if it's a division) at Microsoft smarter than the guy that rooted my computer?"

I'm still not sure of the answer myself, but in my opinion it would be a good idea to give all those XP Home users this ability. (One of the downsides being that prevention is still a more ideal way to deal with this and this just prolongs the Windows institution of allowing the system to be compromised in the first place.)

If the answer to the question Steve asked is still no, then the procedure is straightforward to wipe all the partitions on the infected computer and reinstall all the software.

Philip Sloss

Martinus
Premium Member
join:2001-08-06
EU

Martinus to Vampirefo

Premium Member

to Vampirefo
said by Vampirefo:

Kav, McAfee and any top AV detects the rootkit many ways to remove the rootkit, here is another posted here on dslreports on how to find them.
Thanks,Vampirefo .

So any of these top AVs with updated definitions will be able to identify and block the rootkit before the harm is done, right?

Glad to hear that.

EGeezer
Premium Member
join:2002-08-04
Midwest

EGeezer to psloss

Premium Member

to psloss
Good topic and discussion - my knowledge level on these things is much below Steve , Vampirefo psloss and all you other folks -

This topic triggers some questions on the repair from a known good system;

To me, the complexity and possible hindances would be that the tool would have to have extensive information on the operating system and application files that may be on the infected system in order to prevent reinfection. For example the rootkit could place a piece of itself in a commonly used non-OS application or driver, say a printer driver, word processor, CD burning, spreadsheet etc. that would detect a repaired OS and then reinfect the system from that program. using the driver, opening or running the program could execute the "detect/repair" function of the rootkit.

Wouldn't the repair tool need to verify everything on the system, OS, applications, utilities, drivers, any OEM programs etc. to clean the system? If not, the rogue would still be there, trying -or succeeding- in reinfection.
your moderator at work
Stumbles
join:2002-12-17
Port Saint Lucie, FL

Stumbles to DaveDude

Member

to DaveDude

Re: RSA: Microsoft on 'rootkits': Be afraid, be very

LOL They are just now realizing their system can be rooted.... gesh.

Steve
I know your IP address

join:2001-03-10
Tustin, CA

Steve to EGeezer

to EGeezer

Re: RSA: Microsoft on 'rootkits': Be afraid, be ve

said by EGeezer:

Good topic and discussion - my knowledge level on these things is much below Steve , Vampirefo psloss and all you other folks -
It's not at all clear your knowledge is less than Vampirefo

Martinus
Premium Member
join:2001-08-06
EU

2 edits

Martinus to psloss

Premium Member

to psloss
said by psloss:

If the answer to the question Steve asked is still no, then the procedure is straightforward to wipe all the partitions on the infected computer and reinstall all the software.
Nothing like a good Ghost image from before you got hit.

But how do you exactly know with these rootkits that the ghost image you assume is a pristine backup really is kosher?

There must be some tools out there to find and expose rootkits, provided you boot from a clean environment.

Let me put it this way: how do you know you have a rootkit installed when these bastards are so good at camouflaging and hiding? There must be some kind of computer activity generated by these rotkits that you can identify. What do rootkits really benefit from? Setting a warez tftp server in your box? Stealing your online bank accounts passwords?
psloss
Premium Member
join:2002-02-24

psloss to EGeezer

Premium Member

to EGeezer
said by EGeezer:

To me, the complexity and possible hindances would be that the tool would have to have extensive information on the operating system and application files that may be on the infected system in order to prevent reinfection
Good point(s). I've just been thinking of detection and removal. Repair would (I think) require integrating some of the repair options available off the Windows install CD. Among other things.

And it doesn't address virally-infected third party software.

As to prevention, I don't know if that can be addressed yet, because we're still stuck with a lot of consumer software that's incompatible with the preventative "stuff" in NT/2000/XP. So even if you could apply a security template externally to a "freshly disinfected" system, it's going to break some software.

Philip Sloss

Steve
I know your IP address

join:2001-03-10
Tustin, CA

Steve to Martinus

to Martinus
said by Martinus:

There must be some tools out there to find and expose rootkits, provided you boot from a clean environment.
I think the premise of Microsoft's tool is to run the tool on the infected system, which collects file checksums and the like, then run the tool again from BartPE or the like: if the sets of checksums don't match, it means the live system was lying to you about the filesystem. Then you know you're infected (though not necessarily how).

Once you're infected, though, the game is over: Time to flatten and reload.

Steve

Cudni
La Merma - Vigilado
MVM
join:2003-12-20
Someshire

Cudni to DaveDude

MVM

to DaveDude
There are plenty rootkits and plenty tools that can find them and/or prevent them from being installed in the first place. There must be a rootkit being created...just now... than none of the above tools know about ...until it is discovered

Cudni
psloss
Premium Member
join:2002-02-24

psloss to Steve

Premium Member

to Steve
said by Steve:

Once you're infected, though, the game is over: Time to flatten and reload.
This brings up another point in terms of the "repair" option: the more "stuff" one has to repair, the closer one is to doing a flatten and reload. In which case, why bother with the former...

Philip Sloss
psloss

psloss to Cudni

Premium Member

to Cudni
said by Cudni:

There are plenty rootkits and plenty tools that can find them and/or prevent them from being installed in the first place.
The operating systems will prevent the rootkit from being installed if it can't/isn't run as "root."

Philip Sloss

Vampirefo
Premium Member
join:2000-12-11
Huntington, WV

1 edit

Vampirefo to Steve

Premium Member

to Steve
said by Steve:
said by Vampirefo:


Anything installed on a computer can be removed, it's that simple.
And any credibility you have ever had in this forum has been removed too, it's that simple.
Credibility is in the eye of the beholder, if people want to believe that rootkits can't be removed and they must format their drives, then they should just follow your poor advice.

The more aware or knowledgeable people would test the rootkits and see how easy they realy are to detect and remove, rather than just take your word on it, and format.
psloss
Premium Member
join:2002-02-24

1 edit

psloss

Premium Member

said by Vampirefo:

The more aware or knowledgeable people would test the rootkits and see how easy they real are to detect and remove, rather than just take your word on it, and format.
Can you point me to a reference on how to detect and remove an entrenched Windows kernel rootkit? Or, if you can write up the instructions here, that would be cool, too...

Thanks,

Philip Sloss

Steve
I know your IP address

join:2001-03-10
Tustin, CA

Steve to Vampirefo

to Vampirefo
Well considering that you're confused on safe mode, you're confused on the debug privilege, confused on systems programming in general, I can't see why your advice would carry any weight with anybody.