Kernel EXPLOITATION & ROOTKIT DEVELOPMENT An advance study in cybersecurity Anus khan, Bilal Hassan khan Bscs-2021-32, Bscs-2021-37
Agenda
Introduction
Kernel Exploitation
Rootkit
Project Goals
Research & Identification
Exploit Development
Rootkit Development
Testing and Impact Analysis Controlled Environment Testing : Test the exploit and rootkit in a controlled environment, such as using virtual machines or isolated test systems. Impact Documentation : Analyze how the rootkit affects the system, documenting its ability to hide processes, files, and etc. Assess Performance and Stealth : Evaluate the performance of the rootkit, ensuring it operates efficiently without noticeable system slowdowns or crashes.
Timeline
Conclusion Project Goals: Explore how to launch and execute kernel exploits and rootkit attacks. Understand the potential damage these attacks can inflict on systems. Understanding Attack Mechanisms: Gain insights into the workings of kernel exploits and rootkits, including their stealth and persistence techniques. Study the methods used to hide malicious activities from detection.
Deep Dive into Internals : Enhance knowledge of operating system internals, kernel architecture, and low-level programming. Develop a comprehensive understanding of how the kernel and OS function and how they can be manipulated. Educational Value: The project provides significant learning opportunities in advanced cybersecurity, operating systems, and kernel development.
Thanks!!! Feel Free to Ask Any Q? *******************