Your Intrusion Detection System (IDS) flagged anomalous kernel module activity on production server (app-server-05) at 03:15 UTC on November 28, 2025. System monitoring shows processes mysteriously disappearing from ps output, and files vanishing from directory listings. Your mission is to analyze kernel logs, dmesg output, and system behavior to determine if a rootkit has infected the system.
Rootkits are malicious software designed to hide their presence and the presence of other malware by manipulating the operating system at the kernel level. They are among the most dangerous threats because they operate with highest privileges and can evade traditional detection methods.
Kernel Privileges: Run with Ring 0 access - complete control over the system
Stealth: Hide processes, files, network connections, and even themselves
Persistence: Survive reboots by loading at boot time via kernel modules
Detection Evasion: Can manipulate tools like ps, ls, netstat to hide evidence
Data Theft: Intercept passwords, keystrokes, network traffic at kernel level
Purpose: Extend kernel functionality without recompiling (device drivers, filesystems)
Legitimate Use: Hardware drivers, VPNs, security modules
Malicious Abuse: Rootkits load as kernel modules to hook system calls and hide activity
File Extension: .ko (kernel object) - e.g., evil_module.ko
Purpose: Records kernel-level events including module loads, hardware events, crashes
Critical Indicators: insmod/modprobe commands, module initialization, kernel warnings
What to Look For: Unsigned modules, unusual module names, modules loaded from /tmp
Purpose: Kernel ring buffer containing recent kernel messages
Advantage: Can't be easily cleared by rootkits (requires kernel access)
Contains: Boot messages, hardware detection, driver errors, security warnings
🚨 Critical Warning: Rootkit-infected systems should NOT be trusted for remediation. Always perform forensics from a clean boot environment (live CD/USB) or trusted external system. Never trust tools on a compromised system - they may be modified by the rootkit.
Run bash commands to analyze the logs. Available: cat, grep, lsmod, dmesg, wc, awk, ls, clear, help
This section auto-fills once all tasks are completed correctly.
Complete all tasks to reveal the rootkit infection chain.
The rootkit infection succeeded because:
1. Kernel module signing enforcement was disabled (unsigned modules allowed)
2. Attacker had root access to load kernel modules (insmod command)
3. No integrity monitoring (AIDE/Tripwire) to detect kernel changes
4. Missing rootkit detection tools (chkrootkit, rkhunter)
5. No kernel lockdown or secure boot enabled
The rootkit evaded detection by:
• Hooking getdents() syscall to hide files from ls
• Hooking readdir() to hide from directory listings
• Manipulating /proc to hide processes from ps, top, htop
• Setting module reference count to 0 to appear unused
• Operating entirely in kernel space (no userland footprint)