Skip to content
forked from jdk8/Hypro

VMI on BitVisor to detect hidden rootkits.

Notifications You must be signed in to change notification settings

madtrapper/Hypro

 
 

Repository files navigation

Hypro - VMI on BitVisor to detect hidden rootkits.

tools/adore-ng is a well-known LKM(loadable kernel modules) rootkit for getting root privilege, hiding certain processes, files, ports, .etc.
tools/hypercall has the files to read VM's processes, loaded kernel modules, physical memory from VMM, so we can check the differences to find exceptions.
core/vmmcall_test.c implements the core VMI functions.
VMI/fs is a ported EXT4 file system from Uboot. With this module, we can reread block device to check to hidden files.
Guest's Fs/(attecked)    VMI/fs
  |_______________________|
  |
driver
  |
hardware
BitVisor uses parapass-through architecture that allows VM's device driver to handle the real device. So VMI/fs is ported to host's OS.

How to build:
Hypro's build can be found in BitVisor's HomePage.

About

VMI on BitVisor to detect hidden rootkits.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 81.8%
  • Perl 6.8%
  • Makefile 4.0%
  • Assembly 2.2%
  • C++ 1.8%
  • DIGITAL Command Language 1.6%
  • Other 1.8%