howto uncompress kermel image?
I wonder how can one uncompress the kernel image (in /boot directory), for let's say investigation purposes? It looks neither gzipped nor bzipped and still it is compressed.
|
The file contains several executable sections that do the uncompression when you are actually booting. You should take a look at http://www2.linuxjournal.com/article/2239 to see just how the kernel boots and where the data is stored.
|
Quote:
Trying to determine what is going on by reading machine code would not be MY idea of fun......YMMV..;) |
I had an intrusion nearly a week ago and a rootkit, which I've cleaned out as I think. But, in fact I'm trying to detect whether there was a change in system calls or not. I've found this article, very good and helpfull in my opinion :D
http://www.securityfocus.com/infocus/1811 And it says: Quote:
That's it. |
Usually they're Bzipped, so I think you'll need to 'bunzip2' the kernel file - though I'd do that to a copy of it instead.
Sam |
If you think you had a rootkit, I strongly advise you to reinstall. No need to worry about what's changed in the kernel then.
|
Quote:
Code:
bunzip2: xvmlinuz-2.6.9-22.0.1.ELsmp is not a bzip2 file. Quote:
|
All times are GMT -5. The time now is 09:38 PM. |