skip to main | skip to sidebar

Work

Sunday, September 28, 2008

Linux backdoor and keylogger links

http://www.governmentsecurity.org/archive/t3826.html
http://www.symantec.com/security_response/writeup.jsp?docid=2007-072612-1704-99
http://itgossips.com/2008/02/how-to-create-one-way-linux-backdoor-using-pair-key/
http://www.governmentsecurity.org/archive/t3480.html
http://www.linux-sec.net/Sniffer/
http://www.techworld.com/networking/features/index.cfm?featureid=2491
Posted by Jiang at 8:56 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Linux, rootkit

No comments:

Post a Comment

Newer Post Home
Subscribe to: Post Comments (Atom)

Pages

  • Home
  • Usenix security

Labels

_KPCR (1) 64bit (1) 9054 (1) ACPI (7) acrobat (1) AES (1) algorithm (4) AMD (1) AMT (1) Apache (1) APC (1) APIC (1) assembly (5) ASUS (1) bash (4) beep (1) BFS (1) BIOS (11) bochs (2) BootP (1) bootup (1) buddy (1) C++ (1) caller (1) cell phone (1) CentOS (8) Chinese (1) Cisco (1) clone (1) coreboot (2) CPU (2) cscope (2) ctag (1) data structure (1) DDK (1) deadlock (1) Debug (9) DELL (1) device driver (11) disk (3) dll (1) DMA (1) DOS (1) DPC (1) e1000 (2) EC (1) error code (1) ESXi (2) Excel (1) fabric (1) facebook (1) file (1) file system (1) finite automata (1) firefox (2) Flash (1) forensics (1) FPGA (1) Ftrace (1) function_call (1) FVM (2) GAS (2) gcc (3) GDB (5) getopt (1) git (4) google (1) Grammar (1) grep (2) hash (1) heap (2) hibernation (2) Hyper-V (2) HyperSpace (1) IDT (2) IE (2) ifconfig (1) initrd (1) Intel (5) Interrupt (2) IO (3) ioremap (2) Java (2) kdump (1) kernel (13) kernel panic (3) kexec (1) kobjects (1) KVM (1) latex (2) ldd (1) libcap (2) libnet (1) library (1) libvirt (1) linked_list (1) Linux (105) livecd (1) liveKd (1) LKM (1) LOC (1) log (1) ls (1) lxr (3) Mac (1) Matlab (2) memcached (1) memory (4) MIT opencourseware (1) mm (2) MSI (2) MSR (1) Mutex (1) nasm (1) NDIS (1) neighboring (1) netcat (1) netperf (1) network (8) network namespaces (1) nfs (1) NIC (5) NUMA (1) oops (2) openstack (1) oprofile (1) OS (1) OutputDebugString (1) page table (1) papers (2) passthrough (1) password (1) PC (1) PCI (6) PCIe (4) pdf (1) PE (1) per-CPU (1) perl (1) powerpoint (1) printk (1) process (4) PSE (1) PXE (4) Python (5) qemu (18) RDO (1) RDP (2) rdtsc (1) real mode (2) Reverse Engineering (1) rootkit (3) route (1) RPM (3) scale (1) scp (1) screen (1) Segmentation fault (1) sendmail (1) serial console (3) SHA1 (1) shell (1) Shutdown (2) skb (1) SMI (1) SMM (5) SMP (2) softirq (1) SSDT (1) ssh (2) stack (1) STREAM benchmark (1) string matching (1) Suspend (3) svn (7) Switch (1) Symbol (1) sysfs (1) syslog (1) sysrq (1) tab (1) tasklet (1) tc (1) TCG (1) tcpdump (1) terminal (1) top (1) TPM (4) trace (1) transparent (1) tree (1) Trusted computing (1) TSC (1) tun/tap (1) ubuntu (11) UEFI (1) UMDF (1) upstart (1) USB (3) User Agent (1) users (1) vi (2) vim (5) Vista (1) vm (1) vmlinux (1) vmware (7) VNC (1) WinDbg (3) Windows (25) Windows_Server_2008 (1) x86_64 (2) Xen (15) xenoprofile (1) Xentrace (1) Xming (1)

Followers

Blog Archive

  • ►  2020 (1)
    • ►  September (1)
  • ►  2016 (3)
    • ►  September (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2015 (20)
    • ►  December (1)
    • ►  October (3)
    • ►  August (1)
    • ►  July (14)
    • ►  May (1)
  • ►  2014 (6)
    • ►  December (3)
    • ►  October (1)
    • ►  August (1)
    • ►  February (1)
  • ►  2013 (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (3)
    • ►  May (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2012 (30)
    • ►  November (4)
    • ►  October (4)
    • ►  September (1)
    • ►  August (3)
    • ►  May (1)
    • ►  April (7)
    • ►  March (3)
    • ►  February (5)
    • ►  January (2)
  • ►  2011 (75)
    • ►  December (14)
    • ►  November (11)
    • ►  October (5)
    • ►  September (12)
    • ►  August (2)
    • ►  July (1)
    • ►  June (4)
    • ►  April (8)
    • ►  March (8)
    • ►  February (7)
    • ►  January (3)
  • ►  2010 (61)
    • ►  December (2)
    • ►  November (5)
    • ►  September (2)
    • ►  August (6)
    • ►  July (7)
    • ►  June (11)
    • ►  May (10)
    • ►  April (4)
    • ►  March (7)
    • ►  February (3)
    • ►  January (4)
  • ►  2009 (143)
    • ►  December (11)
    • ►  November (9)
    • ►  October (6)
    • ►  September (8)
    • ►  August (12)
    • ►  July (26)
    • ►  June (15)
    • ►  May (9)
    • ►  April (16)
    • ►  March (12)
    • ►  February (11)
    • ►  January (8)
  • ▼  2008 (35)
    • ►  December (12)
    • ►  November (7)
    • ►  October (12)
    • ▼  September (4)
      • Javascript encoding and attack
      • Web security paper collection
      • Store file on line
      • Linux backdoor and keylogger links

About Me

Jiang
View my complete profile