> > I'm working on a really interesting personal project: To create such
> > application that will alter the actual kernel to insert its code into
> > it. You can think of "Bark Orffice", but alot more suffisticated, since
> > it takes alot to alter the actual kernel. Ie, is the SMP compiled or
> > not, what version etc. But it looks very good so far. In the first
> > change I'm just doing raw source apply to the kernel and testing it.
> > First goal: to hide traffic within the ping packets: Pattern encoding to
> > make
> > harder for anyone to detect.
> >
> > What do you folks think ?
>
>   sounds like an interesting project, and I'd be interested to see what
> you come up with. but frankly I think the chances of you bridging the
> gap between a source-code patch and an executable which actually alters
> the running kernel on the fly (which it sounds like your endgoal is)
> are pretty slim.

I used to specialiaze in AI, and now I can see how I can use this knowledge.

>   you said it yourself; "is the SMP compiled.. what version etc".. i
> really doubt it'd be feasible for your program to be scanning the
> running
> kernel for the target code and then corrupt it dynamically. if I'm not
> mistaken the kernel is not going to allow any other code to touch it's
> stack in the first place. (isn't that the whole point of protected
> memory?)

True, that is why I will not attack a running kernel, its worthless.

>   then again I don't know enough about the guts of linux to really
> be certain of any of the above speculation.

Nether do I, but I am doing this for fun, and mainly to help me understand the
kernel and perhaps met some new folks from whom I can learn, play dum and
stupid, and when I find someone who is seriously interested then put all the
cards on the table.

>
>
>   jd

-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to