SlideShare a Scribd company logo
1 of 25
Download to read offline
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Userland Rootkits
How to Hide From root
Brett Mack
@phpops
16/02/2017
1
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Userland Rootkits
For Fun and Profit
Brett Mack
@phpops
16/02/2017
2
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Userland Rootkits
For Fun and Profit
Brett Mack
@phpops
16/02/2017
3
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16/02/2017
4
Malware is great…
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Malware is great…
16/02/2017
5
right up until it is used
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Malware is great…
16/02/2017
6
right up until it is used
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 7
Agenda
• What is a root kit?

• The LD_PRELOAD technique
• How to detect a root kit
• How to remove a root kit

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 8
What is a root kit?
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 9
What is a root kit?
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 10
What is a root kit?
•Essentially a MitM, sitting between users and the kernel
•Used to hide the presence of users/processes
•Used to maintain access to a box
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 11
What is a root kit?
•The initial entry point on to your box
•A virus.
It is NOT:
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 12
What is a root kit?
# strace ls /tmp
...
stat("/tmp", {st_mode=S_IFDIR|S_ISVTX|0777,...}) = 0
open("/tmp", O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC) = 3
...
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 13
What is a root kit?
Call open()
Interrupt descriptor table (IDT) syscall table
Choose interrupt handler Choose system call sys_open()
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 14
What is a root kit?
Call open()
Interrupt descriptor table (IDT) syscall table
Choose interrupt handler Choose system call sys_open()
User mode
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 15
What is a root kit?
Call open()
Interrupt descriptor table (IDT) syscall table
Choose interrupt handler Choose system call sys_open()
User mode
kernel mode
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 16
What is a root kit?
The root kits of yesteryear
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 17
What is a root kit?
The root kits of yesteryear
#!/bin/bash
mv /bin/ls /bin/.ls.bak
echo <<EOF > /bin/ls
#!/bin/bash
/bin/.ls.bak $@ | grep -v greg
EOF
chmod 0755 /bin/ls
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 18
The LD_PRELOAD technique
DEMO
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 19
The LD_PRELOAD technique
LD_PRELOAD=/my/file.so ls -al
export LD_PRELOAD=/my/file.so
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 20
The LD_PRELOAD technique
LD_PRELOAD=/my/file.so ls -al
export LD_PRELOAD=/my/file.so
echo /my/file.so > /etc/ld.so.preload
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 21
The LD_PRELOAD technique
LD_PRELOAD=/my/file.so ls -al
export LD_PRELOAD=/my/file.so
echo /my/file.so > /etc/ld.so.preload
WHY?!?!?!
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 22
The LD_PRELOAD technique
So why dynamically link?
•Much smaller file size
•You can update libraries while maintaining backwards
compatibility
•Essentially we get much the same benefits as we do
with micro services
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 23
Detecting a root kit
Look at what is being linked by standard system tools
•strace
•ltrace
•ldd
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 24
Removing a rootkit
There are tools out there that are good at removing
certain types of root kit
•rkhunter
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 25
Thanks 

Questions

More Related Content

What's hot

Mock up 1 (double page spread)
Mock up 1 (double page spread)Mock up 1 (double page spread)
Mock up 1 (double page spread)AlexBradbury
 
تاريخ دول الإسلام
تاريخ دول الإسلامتاريخ دول الإسلام
تاريخ دول الإسلامMotasem Ash
 
Sharrette urban renewal bait shemesh_bialik neighborhood
Sharrette urban renewal bait shemesh_bialik neighborhoodSharrette urban renewal bait shemesh_bialik neighborhood
Sharrette urban renewal bait shemesh_bialik neighborhoodiritdrorarch
 

What's hot (6)

Mock up 1 (double page spread)
Mock up 1 (double page spread)Mock up 1 (double page spread)
Mock up 1 (double page spread)
 
U P C Y C L E
U P C Y C L EU P C Y C L E
U P C Y C L E
 
Ebc chola
Ebc cholaEbc chola
Ebc chola
 
Ascii sms
Ascii smsAscii sms
Ascii sms
 
تاريخ دول الإسلام
تاريخ دول الإسلامتاريخ دول الإسلام
تاريخ دول الإسلام
 
Sharrette urban renewal bait shemesh_bialik neighborhood
Sharrette urban renewal bait shemesh_bialik neighborhoodSharrette urban renewal bait shemesh_bialik neighborhood
Sharrette urban renewal bait shemesh_bialik neighborhood
 

Viewers also liked

Bloque 1 tatiana zambrano
Bloque 1   tatiana zambrano Bloque 1   tatiana zambrano
Bloque 1 tatiana zambrano Kevin Gaibor
 
Marisa's Presentation
Marisa's PresentationMarisa's Presentation
Marisa's Presentationmag0085
 
Звіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docx
Звіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docxЗвіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docx
Звіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docxKristina Bogachuk
 
ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017
ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017
ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017Mîneran Sergiu
 
Inyección subcutánea
Inyección subcutáneaInyección subcutánea
Inyección subcutáneaMigue Rejon
 
Technical Wreck Course Prospectus
Technical Wreck Course ProspectusTechnical Wreck Course Prospectus
Technical Wreck Course ProspectusAndy Davis
 

Viewers also liked (9)

Brochure
BrochureBrochure
Brochure
 
Bloque 1 tatiana zambrano
Bloque 1   tatiana zambrano Bloque 1   tatiana zambrano
Bloque 1 tatiana zambrano
 
Web 2.0 Jasmin
Web 2.0 JasminWeb 2.0 Jasmin
Web 2.0 Jasmin
 
Marisa's Presentation
Marisa's PresentationMarisa's Presentation
Marisa's Presentation
 
Звіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docx
Звіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docxЗвіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docx
Звіт директора ТЗОШ №4 за звітний період з 20.05.2014 р. по 20.05.2015 р.docx
 
ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017
ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017
ZIARUL LOCAL AL COMUNEI BOCSIG FEBRUARIE 2017
 
Facial paralysis
Facial paralysisFacial paralysis
Facial paralysis
 
Inyección subcutánea
Inyección subcutáneaInyección subcutánea
Inyección subcutánea
 
Technical Wreck Course Prospectus
Technical Wreck Course ProspectusTechnical Wreck Course Prospectus
Technical Wreck Course Prospectus
 

Similar to How to Hide From root and Detect Userland Rootkits

Similar to How to Hide From root and Detect Userland Rootkits (14)

Plain lined doc
Plain lined docPlain lined doc
Plain lined doc
 
مذكرة انجليزى kg2
مذكرة انجليزى kg2مذكرة انجليزى kg2
مذكرة انجليزى kg2
 
BaseN Company Overview
BaseN Company OverviewBaseN Company Overview
BaseN Company Overview
 
Interesting facts about voice search seo 2019
Interesting facts about voice search seo 2019Interesting facts about voice search seo 2019
Interesting facts about voice search seo 2019
 
SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...
 
SAP MM ONLINE TRAINING
SAP MM ONLINE TRAININGSAP MM ONLINE TRAINING
SAP MM ONLINE TRAINING
 
Mm
MmMm
Mm
 
Training MM Online SAP Course
Training MM Online SAP CourseTraining MM Online SAP Course
Training MM Online SAP Course
 
SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...
 
SAP MM ONLINE TRAINING SAP MM COURSE
SAP MM ONLINE TRAINING SAP MM COURSESAP MM ONLINE TRAINING SAP MM COURSE
SAP MM ONLINE TRAINING SAP MM COURSE
 
SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...
 
SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...SAP MM Online Training | Materials Management Course ...
SAP MM Online Training | Materials Management Course ...
 
دبلومة المحاسب المالي
دبلومة المحاسب الماليدبلومة المحاسب المالي
دبلومة المحاسب المالي
 
Revive your SharePoint with 2013 migration
Revive your SharePoint with 2013 migrationRevive your SharePoint with 2013 migration
Revive your SharePoint with 2013 migration
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

How to Hide From root and Detect Userland Rootkits