Completed execution hijacking, completed first subsection of backdoor

This commit is contained in:
h3xduck
2022-06-14 15:44:21 -04:00
parent f3a834785a
commit 9951f3a3fd
11 changed files with 292 additions and 8 deletions

View File

@@ -1,6 +1,5 @@
\chapter{Background}
This chapter introduces all the background needed for our research into offensive eBPF applications. Although our rootkit has been developed using a library that will provide us with a layer of abstraction over the underlying operations, this background is needed to understand how eBPF is embedded in the kernel and which capabilities and limits we can expect to achieve with it.
This chapter is dedicated to an study of all the background needed for our research into offensive eBPF applications. Although our rootkit has been developed using a library that will provide us with a layer of abstraction over the underlying operations, this background is needed to understand how eBPF is embedded in the kernel and which capabilities and limits we can expect to achieve with it.
Firstly, we will analyse the origins of the eBPF technology, understanding what it is and how it works, and discuss the reasons why it is a necessary component of the Linux kernel today. Afterwards, we will cover the main features of eBPF in detail and discuss the security features incorporated in the system, together with an study of the currently existing alternatives for developing eBPF applications.
@@ -944,7 +943,7 @@ After this step, the return instruction will be executed. Note that, at this poi
\section{Networking fundamentals in Linux}
\section{Networking fundamentals in Linux} \label{section:networking_fundamentals}
This section presents an overview on the most relevant aspects of the network system in Linux, which will be needed to tackle multiple of the techniques discussed during the design of the network capabilities of our rootkit. In particular, we will be focusing on the Ethernet, IP and TCP protocols.
\subsection{An overview on the network layer}