in reply to Re^2: raw file system and registry data
in thread raw file system and registry data
To actually get back on Perl, i believe basic RR copycat functionality is possible. At the very least, for finding files that aren't shown as a result of API hooking, you can use the "remote view" trick. It is all about accessing regular resources (files) remotelly, like from a shared disk.
The idea is to use a local Perl script that generates an internal treeish representation of the filesystem structure, even NTFS metadata (File::Find and Win32::File possibly). Then, run from another machine in the LAN (or experiment with Perl from within a VM, YMMV) the same set of code, only now reading the initial machine's maped-over drive. Compare the results, and voila, every file found in the second run has possibly been hidden from view by a rootkit. I say possibly because Windows by default hides certain files either way from local view.
I hope it makes some sense.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^4: raw file system and registry data
by ketema (Scribe) on Dec 02, 2005 at 14:35 UTC |