> I'm working on a really interesting personal project: To create such
> application that will alter the actual kernel to insert its code into
> it. You can think of "Bark Orffice", but alot more suffisticated, since
> it takes alot to alter the actual kernel. Ie, is the SMP compiled or
> not, what version etc. But it looks very good so far. In the first
> change I'm just doing raw source apply to the kernel and testing it.
> First goal: to hide traffic within the ping packets: Pattern encoding to
> make
> harder for anyone to detect.
>
> What do you folks think ?
sounds like an interesting project, and I'd be interested to see what
you come up with. but frankly I think the chances of you bridging the
gap between a source-code patch and an executable which actually alters
the running kernel on the fly (which it sounds like your endgoal is)
are pretty slim.
you said it yourself; "is the SMP compiled.. what version etc".. i
really doubt it'd be feasible for your program to be scanning the
running
kernel for the target code and then corrupt it dynamically. if I'm not
mistaken the kernel is not going to allow any other code to touch it's
stack in the first place. (isn't that the whole point of protected
memory?)
then again I don't know enough about the guts of linux to really
be certain of any of the above speculation.
jd
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]