09 March 2006 | 17,689 views

Windows Rootkits

Prevent Network Security Leaks with Acunetix

Windows Rootkits are a big rarity in this modern web hacking tehnology…
I won’t speak exactly about rootkits, because it’s impropriate to call them that way… why? Well rootkits are programs that aid you in getting access to root level users…

So in the case we are using Windows rootkits we should call them admkits (admin kits [©copyrighted to me of course])…. So let’s cut the **** and get down to serious business.

Note: the following admkits are from www.packetstormsecurity.org, there also could be others available on the net… not just the following 4

_ROOT_040

Windows NT Rootkit v0.04 alpha – Hides processes, files, directories, has k-mode shell using TCP/IP – you can telnet into rootkit from remote. Hides registry keys – (keyboard patch disabled in this build.) Includes execution redirection.

Fake Netstat

Fake Netstat is a windows copy of netstat which can hide certain network connections. Requires renaming the original netstat.

NT BindShell

Ntbindshell is a lightweight (24k compiled) cmd.exe backdoor for Windows. Full C source included. Provides two modes of operation – standard (listening mode) or reverse-connect mode. Includes the ability to install itself as a system service, providing a shell with LocalSystem privileges.

reverseTelnet

Reverse telnet redirector / port redirector and front end console for Windows. Perfect for firewall bypassing from inside out. Can be used for bouncing connections, piping or relaying data, or as a quick MIM chat server. Windows executable form only.

More information of course can be found in the readme files from the archive…



Recent in Malware:
- ParanoiDF – PDF Analysis & Password Cracking Tool
- Windows Registry Infecting Malware Has NO Files
- FakeNet – Windows Network Simulation Tool For Malware Analysis

Related Posts:
- Open Source Blamed for Rootkits?
- Sophos Offers Free Rootkit Detection Tool/Software
- VMWare Rootkits, The Next Big Threat?

Most Read in Malware:
- Nasty Trojan Zeus Evades Antivirus Software - 77,309 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,460 views
- US considers banning DRM rootkits – Sony BMG - 44,929 views

Advertise on Darknet

5 Responses to “Windows Rootkits”

  1. Darknet 10 March 2006 at 2:27 am Permalink

    I’ll be doing an extensive article on rootkits and anti-rootkit defences soon, it’s in the works, this is a nice taster.

  2. kurt 10 March 2006 at 5:53 pm Permalink

    i’m wondering why the fake netstat is included here – it doesn’t appear to fall under your definition of adminkit… the description only mentions hiding network traffic…

  3. backbone 13 March 2006 at 10:22 am Permalink

    yes thats right… but i have included it because it hides ports for subseven, netbus etc. which are used by trojans… so it could be considered a very useful tool as admkit… also it has the posibility to chose which ports to hide, by recompiling the source…

  4. zingoria 23 April 2008 at 12:44 pm Permalink

    hi friends

    this is really a useful share also i want to know is there any way to take admin rights on windows based Machines (NT based system) when i logged in as normal user in a domain envirenment. spacially when i dont have access to CD and Floppy and USB as well.

    need assistance from experts.