How does rupurt detect eBPF-based rootkits? #1
-
|
Traditional rootkit scanners miss eBPF rootkits. How does rupurt handle detection of malicious eBPF programs? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
|
rupurt uses a dedicated eBPF detection module that works on multiple levels: 1. BPF Program Enumeration 2. Hook Point Analysis
3. Behavioral Analysis
4. BPF Map Inspection This gives us detection capability against rootkits like ebpfkit, TripleCross, and pamspy that traditional scanners completely miss. |
Beta Was this translation helpful? Give feedback.
rupurt uses a dedicated eBPF detection module that works on multiple levels:
1. BPF Program Enumeration
We enumerate all loaded BPF programs via bpf(BPF_PROG_GET_NEXT_ID) and check each against our signature database of known malicious eBPF programs.
2. Hook Point Analysis
rupurt maps which kernel functions have BPF programs attached (kprobes, tracepoints, XDP, tc). Suspicious attachment points include:
3. Behavioral Analysis
Even unknown eBPF programs get flagged if they: