SlideShare a Scribd company logo
Submit Search
Upload
Login
Signup
Anton Chuvakin on illogic Rootkit Analysis
Report
Anton Chuvakin
Follow
Security Strategy
Nov. 28, 2006
•
0 likes
•
3,426 views
1
of
26
Anton Chuvakin on illogic Rootkit Analysis
Nov. 28, 2006
•
0 likes
•
3,426 views
Report
Business
Technology
Anton Chuvakin on Unix Rootkits and Detailed illogic Rootkit Analysis
Anton Chuvakin
Follow
Security Strategy
Recommended
Linux advanced privilege escalation
Jameel Nabbo
8.1K views
•
11 slides
Security Onion Conference - 2016
DefensiveDepth
2.3K views
•
23 slides
Tutorial 2
tech2click
893 views
•
29 slides
Jaime Peñalba - Kernel exploitation. ¿El octavo arte? [rooted2019]
RootedCON
596 views
•
117 slides
Unix Security
replay21
6.3K views
•
47 slides
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
3.9K views
•
51 slides
More Related Content
What's hot
Basic Linux Security
pankaj009
2.8K views
•
12 slides
Linux Introduction
NexThoughts Technologies
380 views
•
12 slides
CarolinaCon 2008 Rootkits Then and Now
Tyler Shields
558 views
•
37 slides
Group project linux helix
Jeff Carroll
583 views
•
25 slides
BSidesKnoxville 2019 - Unix: The Other White Meat
Adam Compton
225 views
•
49 slides
Malware analysis using volatility
Yashashree Gund
8.2K views
•
17 slides
What's hot
(20)
Basic Linux Security
pankaj009
•
2.8K views
Linux Introduction
NexThoughts Technologies
•
380 views
CarolinaCon 2008 Rootkits Then and Now
Tyler Shields
•
558 views
Group project linux helix
Jeff Carroll
•
583 views
BSidesKnoxville 2019 - Unix: The Other White Meat
Adam Compton
•
225 views
Malware analysis using volatility
Yashashree Gund
•
8.2K views
Exploiting Llinux Environment
Enrico Scapin
•
839 views
How Smart Thermostats Have Made Us Vulnerable
Ray Potter
•
500 views
Kernel Hijacking Is Not an Option: MemoryRanger Comes to The Rescue Again
Igor Korkin
•
1.6K views
Your Linux Passwords Are in Danger: MimiDove Meets the Challenge (lightning t...
Igor Korkin
•
1.1K views
Strategies to design FUD malware
Pedro Tavares
•
3.6K views
Slug 2009 06 SELinux For Sysadmins
PaulWay
•
10.3K views
Hypervisor-Based Active Data Protection for Integrity and Confidentiality of ...
Igor Korkin
•
4.6K views
SELinux for Everyday Users
PaulWay
•
12.9K views
Introduction to SELinux Part-I
n|u - The Open Security Community
•
1.6K views
Bootkits: Past, Present & Future - Virus Bulletin
ESET
•
16.4K views
WIndows Kernel-Land exploitation
kyaw thiha
•
134 views
Ch04 Footprinting and Social Engineering
phanleson
•
1.6K views
chroot and SELinux
Shay Cohen
•
2.4K views
A Quick Introduction to Linux
Tusharadri Sarkar
•
1.7K views
Viewers also liked
Liferay hardening principles
Ambientia
5K views
•
32 slides
Linux Hardening
Michael Boelen
2.4K views
•
60 slides
Intro To Hacking
nayakslideshare
2.9K views
•
34 slides
Abuse of DNS wildcards in China - from passiveDNS perspective
APNIC
1.4K views
•
34 slides
Opsec for security researchers
vicenteDiaz_KL
1.7K views
•
39 slides
Dealing with Linux Malware
Michael Boelen
1.8K views
•
35 slides
Viewers also liked
(20)
Liferay hardening principles
Ambientia
•
5K views
Linux Hardening
Michael Boelen
•
2.4K views
Intro To Hacking
nayakslideshare
•
2.9K views
Abuse of DNS wildcards in China - from passiveDNS perspective
APNIC
•
1.4K views
Opsec for security researchers
vicenteDiaz_KL
•
1.7K views
Dealing with Linux Malware
Michael Boelen
•
1.8K views
Analogic Opsec 101
vicenteDiaz_KL
•
9.3K views
Juniper idp overview
Mohamed Al-Natour
•
3.3K views
Volatile IOCs for Fast Incident Response
Takahiro Haruyama
•
3.4K views
DevOps Security Coffee - Lazy hackers who think out of the box, but stay in t...
Freek Kauffmann
•
932 views
Indicators of Compromise Magic: Living with compromise
F _
•
2.4K views
An Underground education
grugq
•
5.2K views
BsidesSP: Pentesting in SDN - Owning the Controllers
Roberto Soares
•
1.4K views
Click and Dragger: Denial and Deception on Android mobile
grugq
•
44.6K views
Hacking for Dummies 2
Chandra Pr. Singh
•
1.3K views
Evil Shell: Hacking Linux Users
Mohammed ALDOUB
•
4.5K views
openioc_scan - IOC scanner for memory forensics
Takahiro Haruyama
•
5.4K views
Crits new one_dark-goffin
Zeev Rabinovich
•
236 views
Threat intelligence - nullmeetblr 21st June 2015
n|u - The Open Security Community
•
846 views
An Underground education
grugq
•
15.6K views
Similar to Anton Chuvakin on illogic Rootkit Analysis
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin
2.7K views
•
31 slides
Linux Vulnerabilities
SecurityTube.Net
995 views
•
40 slides
Linux Operating System Vulnerabilities
Information Technology
7.4K views
•
40 slides
Unraveling the Snake: Turla
Paül Jaramillo
235 views
•
18 slides
An overview of unix rootkits
UltraUploader
446 views
•
27 slides
Network security
Greater Noida Institute Of Technology
118 views
•
58 slides
Similar to Anton Chuvakin on illogic Rootkit Analysis
(20)
Anton Chuvakin FTP Server Intrusion Investigation
Anton Chuvakin
•
2.7K views
Linux Vulnerabilities
SecurityTube.Net
•
995 views
Linux Operating System Vulnerabilities
Information Technology
•
7.4K views
Unraveling the Snake: Turla
Paül Jaramillo
•
235 views
An overview of unix rootkits
UltraUploader
•
446 views
Network security
Greater Noida Institute Of Technology
•
118 views
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Eric Vanderburg
•
1.4K views
Linux - Introduction
Shashank Chintalagiri
•
420 views
Rootkit&honeypot aalonso-dcu-dec09
Angelill0
•
284 views
Linux Virus
Akhil Kadangode
•
3.1K views
LXC, Docker, security: is it safe to run applications in Linux Containers?
Jérôme Petazzoni
•
22.7K views
Docker, Linux Containers (LXC), and security
Jérôme Petazzoni
•
51.7K views
Docker, Linux Containers, and Security: Does It Add Up?
Jérôme Petazzoni
•
9.3K views
Penetration Testing Boot CAMP
Shaikh Jamal Uddin l CISM, QRadar, Hack Card Recovery Expert
•
1.1K views
Host security
Nguyen Tam
•
368 views
Host security
Nguyen Tam
•
328 views
Unix 3 en
Simonas Kareiva
•
454 views
CEHv10 M0 Introduction.pptx
YasserOuda2
•
29 views
Hacking Exposed LIVE: Attacking in the Shadows
Priyanka Aash
•
495 views
Anton Chuvakin on Honeypots
Anton Chuvakin
•
1.8K views
More from Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
14 views
•
22 slides
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
248 views
•
18 slides
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
130 views
•
10 slides
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
271 views
•
21 slides
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
379 views
•
25 slides
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
279 views
•
14 slides
More from Anton Chuvakin
(20)
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
•
14 views
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
•
248 views
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
•
130 views
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
•
271 views
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
•
379 views
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
•
279 views
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
•
423 views
Modern SOC Trends 2020
Anton Chuvakin
•
747 views
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
•
339 views
Generic siem how_2017
Anton Chuvakin
•
1K views
Tips on SIEM Ops 2015
Anton Chuvakin
•
364 views
Five SIEM Futures (2012)
Anton Chuvakin
•
606 views
RSA 2016 Security Analytics Presentation
Anton Chuvakin
•
494 views
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
•
10K views
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
•
14K views
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
•
3.4K views
SIEM Primer:
Anton Chuvakin
•
4.7K views
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Anton Chuvakin
•
1.5K views
On Content-Aware SIEM by Dr. Anton Chuvakin
Anton Chuvakin
•
1.7K views
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Anton Chuvakin
•
2.6K views
Recently uploaded
2023-09 Bloomerang Academy Text Fundraising Presentation.pdf
Bloomerang
47 views
•
41 slides
EQX Corporate Presentation
Equinox Gold Corp.
407 views
•
28 slides
Brighton SEO Sept 2023 - How & Why the history of SEO will help us plan for t...
Varn
22 views
•
34 slides
VC AI Deep Dive: Embracing the Potential, Addressing the challenges, and Pinp...
saastr
23 views
•
29 slides
NewBase 18 September 2023 Energy News issue - 1657 by Khaled Al Awadi_compr...
Khaled Al Awadi
21 views
•
25 slides
Who Da Star treatment.pdf
JaimeClark10
17 views
•
20 slides
Recently uploaded
(20)
2023-09 Bloomerang Academy Text Fundraising Presentation.pdf
Bloomerang
•
47 views
EQX Corporate Presentation
Equinox Gold Corp.
•
407 views
Brighton SEO Sept 2023 - How & Why the history of SEO will help us plan for t...
Varn
•
22 views
VC AI Deep Dive: Embracing the Potential, Addressing the challenges, and Pinp...
saastr
•
23 views
NewBase 18 September 2023 Energy News issue - 1657 by Khaled Al Awadi_compr...
Khaled Al Awadi
•
21 views
Who Da Star treatment.pdf
JaimeClark10
•
17 views
Corporate Governance for South African Mining Companies (a practitioner's view)
James AH Campbell
•
188 views
TEN prospect.pdf
JaimeClark10
•
18 views
Company Valuation webinar series - Tuesday, 12 September 2023
FelixPerez547899
•
177 views
BlueSnap Overview Deck
Norma Mushkat Gaffin
•
24 views
Grand Challenges & Platform Ecosystems
Paavo Ritala
•
168 views
Winning Patients with Google Ads
Stewart Gandolf
•
73 views
Social Media Presentation.pptx
LuanWise1
•
130 views
BGC - Bible Club Sept 13, 2023.pdf
Carlos Garcia
•
107 views
Efficient China Shipping Solutions with Larkser.pdf
Larkser
•
83 views
Under the hood: A Look at How Salesforce Runs Its Internal Forecasting Process
saastr
•
24 views
How to properly use SEO, branding and brand protection to lower your CPA (4).pdf
IvanaFlynn1
•
54 views
California Carpet Stewardship Program Q2 2023 Results
Carpet America Recovery Effort
•
36 views
Transforming Smartsheet into a Strategic Portfolio Management Solution with O...
OnePlan Solutions
•
22 views
SWOT Analaysis - Dr. Emmanuel Dotong.pdf
Dotong Consulting
•
95 views
Anton Chuvakin on illogic Rootkit Analysis
1.
UNIX Rootkits and
Illogic Kit Analysis Anton Chuvakin, Ph.D. Senior Security Analyst FBI Academy June 2002
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.