Relevant is only the PDF, which contains all the work, including the source code and the screenshots below.
NBRK - Ninja Boot Rootkit (for TrueCrypt hidden OS)
-
The following document presents the results of a research about the infection-resistency of the truecrypt hidden operating system against the threats of boot rootkits. It targets the questions whether the state of the art malware could persistently infect the hidden OS from the outside (ie decoy OS), and if yes – how.
-
An in depth analysis by creating a working boot rootkit for the truecrypt hidden operating system (various windows flavours), with in mem bootsector patching, revealing all passwords in pre kernel- (mbr, chainloader), kernel- ("kernel password painter"), and user space (via ndis exploit or ntfs password writer), ...
-
Additional to it, a whole flexible boot chain loader "purple chain" was presented, including possibilities to boot any sector(s) on the truecrypt encrypted disk, to boot from CDROM after decryption, and lots of fancy stuff ...
(NDIS exploit, triggered over network, for demo purposes)
(results in passwords printed by command.com for demo purposes):
for research purposes
Screenshots shown randomly on Windows 7, and Windows XP (working on both systems)