🛡️ Challenge 06 • Rootkit & Kernel Attack Detection

Offline Level 6 - Advanced Kernel-Level Threats
💡 Next Hint: 30s

Mission Brief

Your Intrusion Detection System (IDS) flagged anomalous kernel module activity on production server (app-server-05) at 03:15 UTC on November 28, 2025. System monitoring shows processes mysteriously disappearing from ps output, and files vanishing from directory listings. Your mission is to analyze kernel logs, dmesg output, and system behavior to determine if a rootkit has infected the system.

⚠️ ADVANCED CHALLENGE - KERNEL-LEVEL THREATS
This challenge involves detecting sophisticated rootkits that operate at kernel level. All log data, module names, and behaviors are synthetically generated for training. Rootkits are among the most dangerous and stealthy threats in cybersecurity.

Available Artifacts

  • /var/log/kern.log – Kernel messages and module operations
  • dmesg output – Kernel ring buffer (recent kernel messages)
  • lsmod output – Currently loaded kernel modules
  • ps aux vs /proc comparison – Process discrepancies
  • /var/log/syslog – System events during infection

Learning Objectives

  • Detect malicious kernel module loading
  • Identify process and file hiding techniques
  • Analyze kernel log anomalies and warnings
  • Recognize syscall hooking and kernel manipulation
  • Understand rootkit persistence mechanisms
  • Use advanced detection tools (chkrootkit, rkhunter concepts)