Azazel is a userland rootkit written in C based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection. Features include log cleaning, pcap subversion, and more.
- Avoids unhide, lsof, ps, ldd detection
- Hides files and directories
- Hides remote connections
- Hides processes
- Hides logins
- PCAP hooks avoid local sniffing
- Two accept backdoors with full PTY shells.
- Crypthook encrypted accept() backdoor
- Plaintext accept() backdoor
- PAM backdoor for local privesc and remote entry
- Log cleanup for utmp/wtmp entries based on pty
- Uses xor to obfuscate static strings
As with anything of this nature, it’s recommended you check the source-code/run it in a safe environment etc. But if I have to emphasise stuff like that, this is probably the wrong site for you.
You can grab Azazel from Github here:
git clone https://github.com/chokepoint/azazel.git
Or read more here.
- Kali Linux – The Most Advanced Penetration Testing Linux Distribution
- Serious Linux/UNIX FTP Flaw Allows Command Execution
- OpenVPN Vulnerable To Shellshock Exploit
- Sophos Offers Free Rootkit Detection Tool/Software
- Trafscrambler – Anti-sniffer/IDS Tool
- Open Source Blamed for Rootkits?
Most Read in Linux Hacking:
- Kon-Boot – Reset Windows & Linux Passwords - 135,544 views
- Russix – LiveCD Linux Distro for Wireless Penetration Testing & WEP Cracking - 124,909 views
- BackTrack v2.0 – Hackers LiveCD Finally Released - 100,522 views