Monday, November 29, 2021
HomeCybersecuritySecurity ToolsTyton: Rootkit Hunter

Tyton: Rootkit Hunter

Rootkits often have core functionality that make them similar. The most common rootkit functions involve hiding the attacker’s malicious files, processes, or network connections, providing unauthorized access for future events (backdoors), deploying keyloggers, and deleting system logs that would reveal the attacker’s presence.

Loadable kernel modules are an important companion of the Linux kernel, LKMs for example.

Typically, LKMs are used to add or add extra system calls to support fresh hardware (as device drivers) or file systems. Without LKMs, any predicted functionality must be included in an operating system.

When developing a platform to use with everything from a smartphone to a server, this is borderline impossible to do. LKMs provide the kernel and the device user with 
extra functionality by extension, and can be safely added or removed when needed or not.

Read Also: The powerful truth – All those “smart” devices…

Therefore, developing multiple methods of detection on more advanced rootkits would benefit system administrators globally.

Tyton Detected Attacks

  • Process Fops Hooking
  • Interrupt Descriptor Table Hooking
  • Syscall Table Hooking
  • Zeroed Process Inodes
  • Network Protocol Hooking

Dependencies

  • Linux Kernel 4.4.0-31 or greater
  • GTK3 & GCC
  • Make
  • Package Config
  • Libnotify
  • Libsystemd
  • GTK3
Download Tyton
SourceGitHub
- Advertisement -Threat Intelligence

Latest stories

An In-Depth Guide to Network Security

How much do you know about network security? Do you have a high-level understanding of how it works? Do you know the top priorities...

5 Steps to Protect Yourself Against Ransomware

If you’ve been keeping up with cybersecurity news lately, you’ve likely heard of ransomware, one of the most dangerous cyber threats businesses can face. Ransomware...

How to Spot a Phishing Email

What’s the first thing you do when you get an email in your inbox? If you’re like most people, your answer probably involves something...

Behind The Scenes of a Malware Analysis

Every computer user understands the importance of cybersecurity in today’s world, and businesses must work hard to protect themselves against malicious attacks. But what...

6 Biggest Cybersecurity Threats Facing Businesses

Every day, cybercriminals are finding new ways to target businesses and steal their data, either to sell to the highest bidder or just out...