Skip to content

An in depth analysis by creating a working boot rootkit for the truecrypt hidden encrypted OS, with in mem bootsector patching, revealing all passwords in pre kernel-, kernel-, and user-space, ...

Notifications You must be signed in to change notification settings

M64GitHub/truecrypt-ninja-boot-root

Repository files navigation

3 This is an old security research project, dating back to 2012/13. It was released to only a few people/groups for obvious reasons. My goal back then was to fully reverse engineer truecrypts protection and exploit all security measures. As truecrypt is gone, I decided to publish it openly. I have left a secret pointer within the PDF to proove ownership. The original upload is still at http://www.k00n.byethost7.com, and can be traced back by "the internet wayback machine".

Relevant is only the PDF, which contains all the work, including the source code and the screenshots below.

NBRK - Ninja Boot Rootkit (for TrueCrypt hidden OS)

  • The following document presents the results of a research about the infection-resistency of the truecrypt hidden operating system against the threats of boot rootkits. It targets the questions whether the state of the art malware could persistently infect the hidden OS from the outside (ie decoy OS), and if yes – how.

  • An in depth analysis by creating a working boot rootkit for the truecrypt hidden operating system (various windows flavours), with in mem bootsector patching, revealing all passwords in pre kernel- (mbr, chainloader), kernel- ("kernel password painter"), and user space (via ndis exploit or ntfs password writer), ...

  • Additional to it, a whole flexible boot chain loader "purple chain" was presented, including possibilities to boot any sector(s) on the truecrypt encrypted disk, to boot from CDROM after decryption, and lots of fancy stuff ...

Full Disclosure PDF

Ninja Boot Root in full Effect

7 6

Kernel Panic Effect (turning bluescreen into purplescreen)

(NDIS exploit, triggered over network, for demo purposes) 10

Effect of NTFS Password writer in 512 bytes

(results in passwords printed by command.com for demo purposes):
5

Purple Chain advanced Boot Environment

for research purposes

Screenshots shown randomly on Windows 7, and Windows XP (working on both systems)

Win XP
1

Win 7
8

About

An in depth analysis by creating a working boot rootkit for the truecrypt hidden encrypted OS, with in mem bootsector patching, revealing all passwords in pre kernel-, kernel-, and user-space, ...

Resources

Stars

Watchers

Forks