翻訳と辞書
Words near each other
・ Direct-to-fan
・ Direct-to-video
・ Direct-view bistable storage tube
・ Direct.h
・ Direct2D
・ Direct2Drive
・ Direct3D
・ Directa Decretal
・ DirectAccess
・ DirectAdmin
・ DirectBand
・ DirectBuy
・ Direct Introduction
・ Direct inward dial
・ Direct Ishq
Direct kernel object manipulation
・ Direct labor cost
・ Direct labour cost variance
・ Direct Legislation League
・ Direct lending
・ Direct limit
・ Direct limit of groups
・ Direct Line
・ Direct Line Group
・ Direct Line with Vladimir Putin
・ Direct linear transformation
・ Direct lobbying in the United States
・ Direct mail fundraising
・ Direct manipulation animation
・ Direct manipulation interface


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Direct kernel object manipulation : ウィキペディア英語版
Direct kernel object manipulation
Direct kernel object manipulation (DKOM) is a common rootkit technique to hide potentially damaging third-party processes, drivers, files, and intermediate connections from the task manager and event scheduler.
==Overview==
At its very core, a rootkit that employs DKOM hides itself from the Object Manager or Task manager. By modifying the linked list containing a list of all active threads and processes, this type of rootkit can essentially hide all traces from the Object Manager by wrapping the pointer away from the rootkit itself. This is possible due to the fact that kernels and loadable drivers have direct access to the memory from its privileged access. When the system kernel pings to find the list of all processes running in the system, it relies on the EPROCESS to find them. However, because a Windows Kernel is thread based and not processed based, pointers can be freely modified without any unintended effects.〔https://www.blackhat.com/presentations/win-usa-04/bh-win-04-butler.pdf Butler, Jamie. ''DKOM,'' HBGary. Retrieved 5/14/2014.〕 By modifying linked list pointers to wrap around the rootkit process itself, the rootkit becomes invisible to the Windows event viewer and any system integrity applications that rely on this list. This allows DKOM rootkits to have free rein over the targeted system.
DKOM Uses 〔http://bsodtutorials.blogspot.com/2014/01/rootkits-direct-kernel-object.html Miller, Harry. '' BSOD Tutorials: Rootkits". BSODTUTORIALS, 27 January 2014. Retrieved 5/1/2014〕
*Hide process
*Hide drivers
*Hide ports
*Elevate privilege level of threads and processes
*Skew forensics
*Full control of system

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Direct kernel object manipulation」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.