Index
A
B
- basic ltrace command
- binary protectors
- Bitlackeys Research
- Blackhat
- Burneye
C
D
- /dev/kmem
- /dev/mem
- DacryFile
- data segment infections
- data structures
- direct PLT infection
- Direct PLT infection
- disinfection program, for reverse text infection method
- DLL injection traces
- DRR
- dynamic segment
- DynamoRIO / Anti-debugging for binary protection
E
- ECFS
- ECFS file
- ECFS snapshot
- ECFS snapshots, without killing process
- ELF anti-debugging and packing techniques
- ELF binary packers
- ELF binary protectors
- elfdemon
- elfdemon source code
- ELF dynamic linking
- ELF file types
- ELF Parser
- ELF program headers
- ELF relocations
- ELF runtime infection
- elfscure
- ELF section headers
- ELF symbols
- ELF virus detection
- ELF virus disinfection
- ELF virus engineering challenges
- ELF virus parasite infection methods
- ELF virus technology
- Embedded ELF debugging
- emulated CPU inconsistencies
- emulation
- entry point modification
- Eresi
- ERESI project
- ET_DYN (shared object) injection / Injection methods
- ET_DYN injection
- ET_DYN injection internals
- ET_REL (relocatable object) injection / Injection methods
- executable injections
- executable memory mappings
- executable reconstruction
- execution control flow, passing to parasite
- explicit addend / ELF relocations
- Extended core file snapshot (ECFS)
F
- flags
- forms, of control flow hijacking
- FreeBSD /dev/kmem
- ftrace
- function hijacking
- function pointer overwrites
- function trampolines
G
H
- hidden processes
- host process
I
- IDA Pro
- illegitimate shared object loading
- implicit addends / ELF relocations
- incorrect GOT addresses
- indirect jmp
- infected LKMs
- infected process
- integrity, of syscall
- interrupt handler patching
K
- k-ecfs
- kdress
- kernel-ecfs file
- kernel code integrity
- Kernel Detective
- kernel function trampolines
- kernel hacking goodies
- kernel infection techniques
- Kernel voodoo
- kprobe rootkits
L
- LD_PRELOAD
- LD_PRELOAD environment variable
- LD_SHOW_AUXV environment variable
- legitimate shared object loading
- legitimate space, finding to store parasite code
- libecfs
- libecfs API
- linker-related environment points
- linker scripts
- Linux ELF core files
- Linux kernel
- Linux padding Virus
- Linux tools
- Linux VMA Voodoo
- LKM files
- LKM infection
- Loadable Kernel Module (LKM)
- LPV virus
- lpv virus
- ltrace
M
- Maya
- Maya's Veil
- Maya-protected binaries
- Mayas Veil
N
O
- obfuscation methods
- Objcopy from GNU binutils
- objdump from GNU Binutils
- Object copy (Objcopy)
- object dump (objdump)
- object obfuscator (objobf)
P
Q
R
- %rax register / Techniques for hijacking execution
- read+write+execute (RWX) / Solution
- readecfs
- readelf command
- regular core file
- relative jmp
- relocatable code injection
- relocatable code injection-based binary patching
- remote code injection techniques
- resistance, to emulation
- Retaliation
- ret instruction
- Return-Oriented Programming (ROP) / Maya's anti-exploitation
- reverse text infection
- reverse text infection method
- reverse text padding infections
- runtime kernel kmem patching
S
- .so injection, with dlopen() shellcode
- .so injection, with LD_PRELOAD
- .so injection, with open()/mmap() shellcode
- .so injection, with VDSO manipulation
- .so injection detection
- Saruman
- Saruman virus
- section header analysis
- section headers, ECFS
- security vulnerability-based attacks / Security vulnerability-based attacks
- shared library injection
- shared library mappings
- shared object loading
- Shiva
- SIGABRT
- SIGSEGV
- SIGTRAP handler technique
- Silvio .text infection method
- Silvio padding infection
- Silvio padding infection method
- Skeksi virus
- sshd_fucker (phrack .so injection paper)
- stack
- static keyword / Symbol bindings
- stock vmlinux
- strace
- string table transformation technique
- strip
- stub
- stub mechanics
- symbol hijacking
- symbol table analysis
- symbol table reconstruction, ECFS / ECFS symbol table reconstruction
- syscall testing
- sys_call_table
- sys_call_table modifications
- sys_write
T
- taskverse
- taskverse techniques
- techniques, for hijacking execution
- textify
- text padding infection, VX Heaven paper
- text segment code injections
- text segment padding infection
- text segment padding infections
- thread-local-storage (TLS) / The process register state and flags
- tools, for detecting PLT/GOT hooks
- tracee
- tracer
- tracer program
U
- UPX
- use cases, for Silvio padding infection
- useful devices and files
- userland exec
V
- VDSO
- VFS function pointer
- VFS layer rootkits
- VMA Monitor
- VMA Voodoo
- vmlinux
- vmlinux patching
- Volatility plt_hook
- vsyscall