Coder Social home page Coder Social logo

zpxlz / bpf-rootkit-workshop Goto Github PK

View Code? Open in Web Editor NEW

This project forked from fkie-cad/bpf-rootkit-workshop

0.0 0.0 0.0 4.11 MB

Workshop: Forensic Analysis of eBPF based Linux Rootkits

License: MIT License

Shell 0.05% Python 0.04% C 86.67% Rust 0.23% Makefile 0.06% HTML 12.96%

bpf-rootkit-workshop's Introduction

DFRWS EU 2023 Workshop: Forensic Analysis of eBPF based Linux Rootkits

Materials for the Workshop Forensic Analysis of eBPF based Linux Rootkits that our colleagues Martin Clauß and Valentin Obst gave at the DFRWS EU 2023 conference. We have published a blog post that covers some of the materials here, and the presented Volatility 3 plugins are available here.

Structure

This is a three-part workshop: introduction, live forensics, and memory forensics. We do not expect you to have any prior knowledge about the BPF subsystem and thus introduce the necessary prerequisites in part one. Part two covers tools and techniques to discover BPF malware from a shell running on the system under investigation. In the third part, we discuss methods to analyze memory images for malicious activities in the BPF subsystem. The slides are located at the root of each subdirectory.

Every part contains several practical exercises. All the materials needed to solve the problems can be found in the materials folder and the solutions can be found in the solutions folder.

Downloads

Certain workshop materials are unsuitable for storage in a git repository. Below are links to download them from external sources.

Virtual Machines

In the slides we mention two virtual machines.

  • The Kali Linux VM contains these materials as well as all required third-party tools and can be used to complete the workshop if the operating system does not support BPF, e.g., in case you use a hardened Linux kernel or any other operating system (BSD, Mac, Windows...). Download
  • The Ubuntu VM is used during the live forensics exercise. Download

Memory Images and Symbols

In the memory forensics part, there are multiple exercises where you have to analyze memory images. Download

To analyze them with Volatility you also need the corresponding symbol files. Download

Packet Captures

Some exercises involve the analysis of pcap files. Download

bpf-rootkit-workshop's People

Contributors

vobst avatar martinclauss avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.