blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying

Preview meta tags from the blog.trailofbits.com website.

Linked Hostnames

21

Thumbnail

Search Engine Appearance

Google

https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying

How to write a rootkit without really trying

We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]



Bing

How to write a rootkit without really trying

https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying

We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]



DuckDuckGo

https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying

How to write a rootkit without really trying

We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]

  • General Meta Tags

    7
    • title
      How to write a rootkit without really trying -The Trail of Bits Blog
    • charset
      UTF-8
    • viewport
      width=device-width,initial-scale=1
    • description
      We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
    • article:section
      posts
  • Open Graph Meta Tags

    7
    • og:url
      https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying/
    • og:site_name
      The Trail of Bits Blog
    • og:title
      How to write a rootkit without really trying
    • og:description
      We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
    • US country flagog:locale
      en_us
  • Twitter Meta Tags

    4
    • twitter:card
      summary_large_image
    • twitter:image
      https://blog.trailofbits.com/img/Trail-of-Bits-Open-Graph.png
    • twitter:title
      How to write a rootkit without really trying
    • twitter:description
      We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
  • Item Prop Meta Tags

    7
    • name
      How to write a rootkit without really trying
    • description
      We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
    • datePublished
      2019-01-17T07:50:53-05:00
    • dateModified
      2019-01-17T07:50:53-05:00
    • wordCount
      1913
  • Link Tags

    11
    • dns-prefetch
      //fonts.googleapis.com
    • dns-prefetch
      //fonts.gstatic.com
    • preconnect
      https://fonts.gstatic.com
    • shortcut icon
      /favicon.png
    • stylesheet
      https://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300..800;1,300..800&family=Rubik:ital,wght@0,300..900;1,300..900&display=swap

Links

60