Write a rootkit to spoof Raspberry Pi serial number
- or -
Post a project like this$
- Posted:
- Proposals: 0
- Remote
- #1332692
- Expired
Description
Experience Level: Entry
General information for the business: None
Description of requirements/functionality: Every Raspberry Pi is manufactured with a unique serial number.
If a hacker hacks in multiple times.. they can obtain the serial number to see that it is the same user.
I have been told that I can create a "kernel-space rootkit to intercept system calls".
It would sit alongside the Raspbian software on the SD card, and would run at boot time.
It would intercept the system call which obtains the serial number, and replace it with a fake serial number.
The serial number is stored in the OTP registers and is obtained by the GPU, but then obtained from the GPU by the CPU.
Here are the scripts used to obtain the serial number... These will help you a lot:
https://github.com/AndrewFromMelbourne/raspi_serialnumber
This rootkit should not modify the actual Raspbian software. It is simply a rootkit that sits on the SD card, and once run, it gets deleted, and it runs in RAM.
It is a hidden process that can't be seen by the "top" command or similar. This is how rootkits work.
This is very similar to doing something like spoofing a MAC address... except you are spoofing the Raspberry Pi serial number.
Hopefully this shouldn't be too hard to create.
It is a KERNEL-SPACE ROOTKIT TO INTERCEPT SYSTEM CALLS.
Specific technologies required: Linux, Raspberry Pi, Computer Security, Debian, Web Security
OS requirements: Linux
Extra notes:
Description of requirements/functionality: Every Raspberry Pi is manufactured with a unique serial number.
If a hacker hacks in multiple times.. they can obtain the serial number to see that it is the same user.
I have been told that I can create a "kernel-space rootkit to intercept system calls".
It would sit alongside the Raspbian software on the SD card, and would run at boot time.
It would intercept the system call which obtains the serial number, and replace it with a fake serial number.
The serial number is stored in the OTP registers and is obtained by the GPU, but then obtained from the GPU by the CPU.
Here are the scripts used to obtain the serial number... These will help you a lot:
https://github.com/AndrewFromMelbourne/raspi_serialnumber
This rootkit should not modify the actual Raspbian software. It is simply a rootkit that sits on the SD card, and once run, it gets deleted, and it runs in RAM.
It is a hidden process that can't be seen by the "top" command or similar. This is how rootkits work.
This is very similar to doing something like spoofing a MAC address... except you are spoofing the Raspberry Pi serial number.
Hopefully this shouldn't be too hard to create.
It is a KERNEL-SPACE ROOTKIT TO INTERCEPT SYSTEM CALLS.
Specific technologies required: Linux, Raspberry Pi, Computer Security, Debian, Web Security
OS requirements: Linux
Extra notes:
Neil H.
0% (0)Projects Completed
-
Freelancers worked with
-
Projects awarded
0%
Last project
19 Apr 2024
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies