
blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying
Preview meta tags from the blog.trailofbits.com website.
Linked Hostnames
21- 18 links tolinux.die.net
- 8 links toblog.trailofbits.com
- 8 links togithub.com
- 6 links toen.wikipedia.org
- 3 links toelixir.bootlin.com
- 2 links toinfosec.exchange
- 1 link toasciinema.org
- 1 link tobooks.gigatux.nl
Thumbnail

Search Engine Appearance
How to write a rootkit without really trying
We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
Bing
How to write a rootkit without really trying
We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
DuckDuckGo

How to write a rootkit without really trying
We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
General Meta Tags
7- titleHow to write a rootkit without really trying -The Trail of Bits Blog
- charsetUTF-8
- viewportwidth=device-width,initial-scale=1
- descriptionWe open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
- article:sectionposts
Open Graph Meta Tags
7- og:urlhttps://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying/
- og:site_nameThe Trail of Bits Blog
- og:titleHow to write a rootkit without really trying
- og:descriptionWe open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
og:locale
en_us
Twitter Meta Tags
4- twitter:cardsummary_large_image
- twitter:imagehttps://blog.trailofbits.com/img/Trail-of-Bits-Open-Graph.png
- twitter:titleHow to write a rootkit without really trying
- twitter:descriptionWe open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
Item Prop Meta Tags
7- nameHow to write a rootkit without really trying
- descriptionWe open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]
- datePublished2019-01-17T07:50:53-05:00
- dateModified2019-01-17T07:50:53-05:00
- wordCount1913
Link Tags
11- dns-prefetch//fonts.googleapis.com
- dns-prefetch//fonts.gstatic.com
- preconnecthttps://fonts.gstatic.com
- shortcut icon/favicon.png
- stylesheethttps://fonts.googleapis.com/css2?family=Open+Sans:ital,wght@0,300..800;1,300..800&family=Rubik:ital,wght@0,300..900;1,300..900&display=swap
Links
60- http://books.gigatux.nl/mirror/networksecuritytools/0596007949/networkst-CHP-7-SECT-2.html
- http://www.brendangregg.com/ebpf.html
- http://www.goldsborough.me/c/low-level/kernel/2016/08/29/16-48-53-the_-ld_preload-_trick
- https://asciinema.org/a/217030
- https://blog.trailofbits.com