Re: Sony: The Return Of The Rootkit

看板Bugtraq作者時間18年前 (2007/09/02 08:41), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/8 (看更多)
Paul Sebastian Ziegler wrote: > Have another one: > http://observed.de/?entnum=101 > > Now I was outraged by Sony's Copyprotection Rootkit - but this is simply > something different. > > Many Greetings > Paul I can't see anything in your article that adds anything to your email, why did you want him to read it? Also, the article by f-secure that you're having a go at, says "This USB stick with rootkit-like behavior" and openly acknowledges that the purpose of hiding files by the device is probably to try and prevent tampering with the fingerprint authentication. Their main point is that: "The Sony MicroVault USM-F fingerprint reader software that comes with the USB stick installs a driver that is hiding a directory under "c:\windows\". So, when enumerating files and subdirectories in the Windows directory, the directory and files inside it are not visible through Windows API. If you know the name of the directory, it is e.g. possible to enter the hidden directory using Command Prompt and it is possible to create new hidden files. There are also ways to run files from this directory. Files in this directory are also hidden from some antivirus scanners (as with the Sony BMG DRM case) 霠depending on the techniques employed by the antivirus software. It is therefore technically possible for malware to use the hidden directory as a hiding place."
文章代碼(AID): #16sWRG00 (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #16sWRG00 (Bugtraq)