PreLab 3: Application Level Rootkit Creation
You are free to write a program on any machine. However, make sure that your programs should work on the virtual machines. To do this, you will be allowed to access virtual machines remotely. Turn-In: Create Lab3 directory under your home directory and place your results in the Lab3 directory. 1. What is a rootkit? List five different types of rootkits. What kind of rootkit is hardest to detect and remove? Justify your answer. 2. Describe how port-binding shell makes it possible for backdoor program to run on the target machine. 3. Write a program that checks whether input string is in the file. We will provide you the program check.c. In check.c, you need to fill in init items and check item functions. Furthermore, you need to create a file with the name of items and fill in the file with arbitrary strings. You will test whether the program is correctly running with the file.
1