Windows Rootkits/API Hooking

From: Harlan Carvey (keydet89at_private)
Date: Thu Mar 13 2003 - 12:55:08 PST

  • Next message: Dan Hanson: "New article announcement: Open Source Honeypots, Part Two: Deploying Honeyd in the Wild"

    In the past couple of weeks, there have been several
    Trojans and backdoors that have appeared on Symantec's
    SecurityResponse site that use API hooking to hide
    themselves.  
    
    I was wondering if anyone has solid proof of a system
    that was compromised using something along these
    lines?  The recent thread regarding an open port 109
    and "winlogon.exe" hasn't shown anything solid to
    support a "Windows kernel rootkit". 
    
    Has anyone seen something like this?  For example, has
    an external port scan shown a TCP port open that did
    NOT appear in the netstat/fport output?  Or has there
    been some other phantom evidence, and it later turned
    out that the system was "infected" with API hooking
    malware?
    
    Thanks,
    
    Carv
    
    __________________________________________________
    Do you Yahoo!?
    Yahoo! Web Hosting - establish your business online
    http://webhosting.yahoo.com
    
    ----------------------------------------------------------------------------
    
    <Pre>Lose another weekend managing your IDS?
    Take back your personal time.
    15-day free trial of StillSecure Border Guard.</Pre>
    <A href="http://www.securityfocus.com/stillsecure"> http://www.securityfocus.com/stillsecure </A>
    



    This archive was generated by hypermail 2b30 : Thu Mar 13 2003 - 14:43:52 PST