Linux Rootkit Detectors

Linux kernel rootkits such as Adore or Knark (an LKM rootkit) are hard to detect since they use a kernel module to hide their behavior. Even software such as Tripwire or an anti-virus solution running on the infected system will not see the presence of these rootkits.

Since these rootkits use the power of the kernel to hide themselves, they are only visible from within the kernel. Kstat (Kernel Security Therapy Anti-Trolls) and Zeppoo allow the user to gather important information about the system, especially the functional call address that is often overwritten by these Linux rootkits. Kstat is currently supported only on Linux kernel 2.4.x, and Zeppoo is currently only supported on kernel 2.6.x. You can find Kstat at http://freshmeat.net/projects/kstat/ and Zeppoo at http://www.zeppoo.net.

In this section, we'll cover some of the common tasks with Kstat, including looking up network interfaces, listing processes from memory, investigating individual processes, and examining the syscall table.

The -s argument displays info about the system call table. The system call table is the usual hooked place for many rootkits. Hooking (changing the address) of these functions allows the rootkit to replace the real existing function by one of their own, thus affecting the behavior of all "user land" applications using those system calls:

Command : kstat -s
## Output of a normal system with hooking rootkit.

SysCall                 Address
sys_exit                0xc0117ce4
sys_fork                0xc0108ebc
sys_read                0xc012604c
sys_write               0xc0126110
sys_open                0xc0125c10
sys_close               0xc0125d60
sys_waitpid             0xc0117ff8
sys_creat               0xc0125ca4

This is the output on a system where a hooking rootkit is used:

SysCall                 Address
sys_exit                0xc0117ce4
sys_read                0xc012604c
sys_open                0xc0125c10
sys_waitpid             0xc0117ff8
sys_creat               0xc0125ca4
sys_fork                0xc4051428 WARNING! Should be at 0xc0108c88
sys_write               0xc4051590 WARNING! Should be at 0xc01269b8
sys_close               0xc405163c WARNING! Should be at 0xc01264a4
sys_kill                0xc40514d0 WARNING! Should be at 0xc011060c
sys_mkdir               0xc405172c WARNING! Should be at 0xc012e540

The syscall table is a good place to look for Linux rootkits. Since Linux uses system calls to interface between the user and the kernel, rootkits tend to hijack these addresses to hide their presence from the user. Note however that this method works best when you are able to compare gathered syscall addresses with those that were saved previously in a known clean state. Doing this test after the post-infection would indicate only that the addresses of the system calls look too far from the other ones, but that is all.

Tip

Having system calls that are out of bound (i.e., in a range too wide for normal operation) is usually a sign that something unusual is going on. In the compromised example shown here, some system calls are in memory addresses from c0117ce4 to c012604c, and others are in c405xxxx. This range is wide considering that system calls should not be spread around.

Zeppoo uses the device /dev/kmem to perform tasks similar to Kstat. However, Zeppoo requires that you generate a table of fingerprints of your kernel before being able to detect a rootkit. This table must be generated from a clean state; otherwise, a previously installed rootkit could be mistaken as being the clean state. The information output provided by Zeppoo is in the same class as Kstat, so if you understand the output of Kstat, understanding the output of Zeppoo should be very similar. Below is a quick list of Zeppoo's functions.

To generate the table of fingerprints, use:

./zeppoo -f FP

To check the system, use:

zeppoo -z FP

To list processes by /dev/mem dumping, use:

zeppoo -p -d /dev/mem

To check for hidden processes, use:

zeppoo -c -p

To get a visualization of the names of IDT with a specific System.map, use:

zeppoo -i -t /boot/System.map-2.6.16

To check the fingerprint using /dev/mem, use:

zeppoo -c -f FP -d /dev/kmem

Chkrootkit uses different techniques to try to identify the presence of rootkits. These techniques include, but are not limited to, hash comparison, string searches, hidden file checks, and some OS-dependent features such as ps versus /proc compare. Doing multiple checks, instead of relying on one technology, offers the best opportunity to find multiple kinds of rootkits. However, since this software comes from the user, rootkits can still evade it.

Here's a sample of Chkrootkit checking:

# ./chkrootkit
ROOTDIR is '/'
Checking 'amd'... not found
Checking 'basename'... not infected
Checking 'biff'... not found
Checking 'chfn'... not infected
....
Checking 'write'... not infected
Checking 'aliens'... no suspect files
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
....
Searching for ESRK rootkit default files... nothing found
Searching for rootedoor... nothing found
Searching for ENYELKM rootkit default files... nothing found
Searching for anomalies in shell history files... nothing found
Checking 'asp'... not infected
....
Checking 'z2'... chklastlog: nothing deleted
Checking 'chkutmp'...
The tty of the following user process(es) were not found in /var/run/utmp !
! RUID          PID TTY    CMD!
root         1988 tty7   /usr/bin/Xorg :0 -audit 0 -auth /var/gdm/:0.Xauth -nolisten
   tcp vt7
chkutmp: nothing deleted