Now Available:

Featured Resources:

Newsletter

Email Address:

Subscribe





Ask the Expert

Have a question for our resident expert? .

Realtime Communities

« Vista Still Having Problems with Server 2003 Admin Pack | Main | Planning for Exchange 2007 Storage Needs »

Rootkits: What they are and how to Fight Them

Do you have a rootkit surreptitiously installed on your servers? How do you know? Are you monitoring for rootkit infestation? Do you know the tools to monitor for rootkit infestation?

Do you know what rootkits are?

A rootkit, at least in the Windows world, is a piece of code that registers with the operating system and montiors for a call to a kernel API. When it sees that call -- perhaps for a file listing -- it intercepts the call, manipulates the result, and sends that result on to the requesting entity.

One example of this is when you attempt to request a "dir" for a particular folder. The rootkit has registered itself with the internal memory pointers for the operating system. When it sees a request for a "dir" to the particular directory it is attempting to cloak, it intercepts the request.

What it does next is insidious (but actually pretty nifty from a strictly geek standpoint). It will then request the "dir" listing from the kernel on behalf of the requestor, manipulate the kernel's response to remove the folders it is attempting to cloak, then send the request back to the command prompt with the removed folders removed.

Well, these sorts of Malware are all very difficult to locate and remove. Since they're registered with the operating system and in-line with the request process for the object they are trying to cloak, finding them is difficult and removing them could crash the operating system. Often, the only way to find the rootkit is to run two separate scans on the operating system: One at a level above the rootkit and another at a core level below it and watch for the differences.

Scary? Yes. Interested in learning more? I read an interesting podcast briefing from SearchSecurity yesterday that discusses the problem in detail. Registration for the briefing is required: http://whitepapers.zdnet.com/whitepaper.aspx?&tag=nl.e539&docid=276641&promo=100511

TrackBack

TrackBack URL for this entry:
https://realtime-windowsserver.com/type/mt-tb.cgi/58

Most Active Posts

Recent Posts

Greg Shields' Bio:

Greg Shields is a Principal Consultant with 3t Systems in Denver, Colorado. With more than 10 years of experience in information technology, Greg has developed extensive experience in systems administration, engineering, and architecture specializing in Microsoft, Citrix, and VMware technologies. Greg is a Contributing Editor for both Redmond Magazine and Microsoft Certified Professional Magazine, authoring two regular columns along with numerous feature articles, webcasts, and white papers. He is known for his abilities to relate highly technical concepts with a drive towards fulfilling business needs. Greg is also a highly sought-after instructor and speaker, teaching system and network troubleshooting curriculum for TechMentor Events, a twice-annual IT conference, and producing computer-based training curriculum for CBT Nuggets on numerous topics. Greg is a triple Microsoft Certified Systems Engineer (MCSE) with security specialization and a Certified Citrix Enterprise Administrator (CCEA).