Interested in getting started with userland rootkits? Brett Mack from OpenCredo will starting right from the beginning on how to create a very basic rootkit!
Brett finds there is so much that can be learned from the InfoSec community, seeing how a system or service can be broken is a great way to learn how it works. This talk aims to provide an introduction to userland rootkits, specifically those that leverage the LD_PRELOAD technique. During the talk, he will take you through creating a very basic rootkit, and show how they work with a little help from C, the GNU linker, and a tiny bit of assembly (Brett knows neither of these languages well so it will be kept basic).
YOU MAY ALSO LIKE:
- Master Application Deployment and Scaling with Kubernetes and Docker (in London on 28th February - 1st March 2019)
- Introduction to Docker Fundamentals (in London on 11th - 12th March 2019)
- Fast Track to Chaos Engineering with Russ Miles (in London on 13th - 15th March 2019)
- µCon London 2019 - The Conference on Microservices, DDD & Software Architecture (in London on 29th - 31st May 2019)
An introduction to userland rootkits. How they work and what we can learn from them
Brett Mack is a DevOps consultant working for OpenCredo. He has been a Linux user since the painful days of Mandrake 8.0.