13.07.2015 Views

Graduate Profiles 2013 - National University of Sciences and ...

Graduate Profiles 2013 - National University of Sciences and ...

Graduate Profiles 2013 - National University of Sciences and ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HIDDEN ACTIVITY LOGGER WITH ROOTKITIn today’s environment, there is a great emphasis on learning the higher level technologies,whereas kernel/lower level stuff leaves a void to be filled. This is the motivation behinddeveloping a project, where concepts such as rootkits <strong>and</strong> process activity interception <strong>and</strong>logging (low level fiddling) come into play. The purpose is to acquire these skills, whiledeveloping a product that is equally useful in the Information Security Stream.The term rootkit refers to ‘stealth’ i.e. hiding the existence <strong>of</strong> activity logger itself. Rootkits are ataboo concept, most notoriously used in Trojans, viruses <strong>and</strong> other forms <strong>of</strong> malwares. Activitylogging is recording certain types <strong>of</strong> activities inside a system. Activity Monitoring is performedby products such as Antiviruses <strong>and</strong> Firewalls.• Firewalls perform network activity monitoring.• Real-time protection mechanisms <strong>of</strong> AntiViruses <strong>and</strong> AntiSpywares perform file systemmonitoring.The product uses client/server architecture to implement the stated functionality.At the server side filter driver <strong>and</strong> rootkit work at the kernel level. Rootkit enables necessary.Components at the server side to remain hidden. The function <strong>of</strong> the filter driver is to interceptthe filesystem I/O calls <strong>and</strong> registry I/O call made by the selected processes <strong>and</strong> logs themdown in separate files for each process. Similarly the LSP monitors the activity taking place onthe network (only activity <strong>of</strong> selected processes); this activity is reported to the LSP client, whichlogs it down. The keylogger records the keystrokes made on the system. At the client side theuser/administrator sends request to the server side to fetch the data. The data is fetched in rawformat <strong>and</strong> is parsed at the client side.Syndicate MembersSyndicate SupervisorMuhammad UmairZagham MehmoodSaad AzizDr. Baber Aslam48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!