Shellcoders Programming Uncovered (Uncovered series)

Console versions of utilities such as ps or top can be easily deceived using a long chain of blank characters or <CR> characters overwriting the original name . This method is not suitable for deceiving an experienced administrator. Furthermore, this technique is powerless against K Desktop Environment (KDE) monitors . However, it is possible to disguise as some innocent process such as vi or bash . To tell the truth, the situation is not as simple as it seems! Nowadays, practically no one works in vi . And where does an "extra" shell come from? A vigilant administrator will notice this immediately. However, if the hacker is lucky enough, this might not happen. After all, lots of users have several copies of shells running, and no one counts them. Also, it is possible to insert into some user process using ptrace ” and it is practically impossible to find hacker there.

If worst comes to worst, the hacker can abandon any concealment . There are lots of processes in the system, and it isn't possible to trace all of them. The main issue is periodically splitting the hacker's process into two ones and killing the original process. This blinds the top utility that informs administrator how long a specific process executed.

It should be mentioned that:

Interesting Links Related to the Stealth Technique

Категории