rongchaua
03-12-2009, 04:10 AM
An interesting paper in .Net Reverse
.NET Framework Rootkits:
Backdoors inside your
Framework
November, 2008
Erez Metula
Link download:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=ycIS1bewMBI%3d&tabid=161&mid=555
The main idea:
Upon request for this DLL from other executables running inside the framework, the
framework will search for the required DLL based on his version and signature. The
framework will not check for the actual signature but instead will rely on the signature
mentioned in the directory file name.
To put it in other words, the signature of the DLL itself is irrelevant, the only
thing that matters is the directory in which it is located.
Source:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=Yq0PeSqeyBo%3d&tabid=161&mid=555
Tool:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=wkKIknI%2btog%3d&tabid=161&mid=555
Modul:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=lJCfE83LS%2f8%3d&tabid=161&mid=555
.NET Framework Rootkits:
Backdoors inside your
Framework
November, 2008
Erez Metula
Link download:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=ycIS1bewMBI%3d&tabid=161&mid=555
The main idea:
Upon request for this DLL from other executables running inside the framework, the
framework will search for the required DLL based on his version and signature. The
framework will not check for the actual signature but instead will rely on the signature
mentioned in the directory file name.
To put it in other words, the signature of the DLL itself is irrelevant, the only
thing that matters is the directory in which it is located.
Source:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=Yq0PeSqeyBo%3d&tabid=161&mid=555
Tool:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=wkKIknI%2btog%3d&tabid=161&mid=555
Modul:
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=lJCfE83LS%2f8%3d&tabid=161&mid=555