what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

flister.txt

flister.txt
Posted Feb 24, 2005
Authored by joanna | Site invisiblethings.org

This is a textfile explaining what flister is and does. FLISTER is proof-of-concept code for detecting files hidden by both usermode and kernelmode Windows rootkits. It exploits the bugs in handling ZwQueryDirectoryFile() calls with ReturnSingleEntry set to TRUE. Flister works on Windows 2000, XP and 2003.

systems | windows
SHA-256 | 5b6b637cd51329f95822be40d03bfadd2f6be2edba391415b001239b956c157e

flister.txt

Change Mirror Download
  FLISTER - uncovering files hidden by Windows rootkits
-------------------------------------------------------

joanna at invisiblethings dot org, 2005.


It's gonna be very simple, but somebody needs to bring it the public
for the goodness of the mankind... or at least the rootkit community;)

When researching some new techniques for files hiding, I came across
the very common bug in many (all?) publicly available windows rootkits
(both user and kernel mode)...

The problem can be noticed when using well known
ZwQueryDirectoryFile() function, with ReturnSingleEntry argument set
to TRUE. All tested rootkits (see below) failed to hide properly the
files or directories which should have need hidden...

As usual the very simple proof-of-concept code is provided:

http://invisiblethings.org/tools/flister.zip

Tested on Windows 2000 SP4, XP SP2 and 2003.
Some examples:

* Vanquish 0.2- flister shows all hidden files

* he4hook 21a - although uses the most advanced file hiding technique
(IRP based), flister can still uncover all hidden files :)

* Hacker Defender 1.00 - flister returns the error code = 0xc000000f
on the hidden file (which leads to easy detection that something's
wrong)

* yyt_hac 1.22 - that really nice Chinese usermode rootkit;) fails
too. It causes ZwQueryDirectoryFile() to return always 0xc000001c
error code, when called with ReturnSingleEntry set to true. Again
this is an obvious way to detect it.

* Basic8 - it simply cuts the output on the hidden file. So, unless
the hidden file is the last file in the directory (in the alphabetic
order) it will remain hidden. In all other cases, all the files
located after the hidden file will be hidden too, which again easily
betrays rootkit.

As an extra bonus, flister can take second argument, which should be
the index of the ZwQueryDirectoryFile service in SDT (which is service
pack dependent). When given the correct index, flister should detect
files hidden by _all_ usermode rootkits, simply because it will call
the service through int 0x2e. This is one of the reasons why usermode
rootkits cannot be considered really stealthy...

You may wonder why I haven't encoded the good old trick to find that
index automatically (namely the *(DWORD*)((char*)addr + 1) trick)?
Well, the answer is simply: some usermode overwrites first few bytes
of ZwQueryDirectoryFile and that trick will fail then :( So, you will
probably need a small database of the correct indexes for all Windows
versions :o

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    29 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close