14 February 2014 | 1,844 views

Azazel – Userland Anti-debugging & Anti-detection Rootkit

Check For Vulnerabilities with Acunetix

Azazel is a userland rootkit written in C based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection. Features include log cleaning, pcap subversion, and more.

Azazel Rootkit

Features

  • Anti-debugging
  • Avoids unhide, lsof, ps, ldd detection
  • Hides files and directories
  • Hides remote connections
  • Hides processes
  • Hides logins
  • PCAP hooks avoid local sniffing
  • Two accept backdoors with full PTY shells.
    • Crypthook encrypted accept() backdoor
    • Plaintext accept() backdoor
  • PAM backdoor for local privesc and remote entry
  • Log cleanup for utmp/wtmp entries based on pty
  • Uses xor to obfuscate static strings

As with anything of this nature, it’s recommended you check the source-code/run it in a safe environment etc. But if I have to emphasise stuff like that, this is probably the wrong site for you.

You can grab Azazel from Github here:

Or read more here.



Recent in Linux Hacking:
- Azazel – Userland Anti-debugging & Anti-detection Rootkit
- Linux.Darlloz Worm Targets x86 Linux PCs & Embedded Devices
- MySQL 1 Liner Hack Gives Root Access Without Password

Related Posts:
- Sophos Offers Free Rootkit Detection Tool/Software
- Trafscrambler – Anti-sniffer/IDS Tool
- Open Source Blamed for Rootkits?

Most Read in Linux Hacking:
- Kon-Boot – Reset Windows & Linux Passwords - 134,507 views
- Russix – LiveCD Linux Distro for Wireless Penetration Testing & WEP Cracking - 124,520 views
- BackTrack v2.0 – Hackers LiveCD Finally Released - 100,443 views

Advertise on Darknet

Comments are closed.