eBPF – Running sandboxed programs in a privileged context such as OS kernel

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com
featured
CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
  1. pamspy

    Credentials Dumper for Linux using eBPF

    This is a good write-up and I like the diagrams. What appears to still be missing in an "off switch". AFAIK there are still no kernel boot time commands to disable eBPF entirely. I have to recompile the kernel to disable it.

    eBPF has the potential for file-less malware to run hidden from detection and I foresee the ability to tickle ring -3 (and -4?) CPU within CPU functions while bypassing local firewalls.

    Here is some example code of what people already know how to do today and this list will grow as people discover more capabilities. [1][2][3][4][5] These do require some privileges to insert but will remain running and hidden until reboot.

    [1] - https://github.com/citronneur/pamspy

    [2] - https://github.com/h3xduck/TripleCross

    [3] - https://github.com/krisnova/boopkit

    [4] - https://github.com/pathtofile/bad-bpf

    [5] - https://doublepulsar.com/bpfdoor-an-active-chinese-global-su...

  2. InfluxDB

    InfluxDB high-performance time series database. Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.

    InfluxDB logo
  3. TripleCross

    A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

    This is a good write-up and I like the diagrams. What appears to still be missing in an "off switch". AFAIK there are still no kernel boot time commands to disable eBPF entirely. I have to recompile the kernel to disable it.

    eBPF has the potential for file-less malware to run hidden from detection and I foresee the ability to tickle ring -3 (and -4?) CPU within CPU functions while bypassing local firewalls.

    Here is some example code of what people already know how to do today and this list will grow as people discover more capabilities. [1][2][3][4][5] These do require some privileges to insert but will remain running and hidden until reboot.

    [1] - https://github.com/citronneur/pamspy

    [2] - https://github.com/h3xduck/TripleCross

    [3] - https://github.com/krisnova/boopkit

    [4] - https://github.com/pathtofile/bad-bpf

    [5] - https://doublepulsar.com/bpfdoor-an-active-chinese-global-su...

  4. boopkit

    Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.

    This is a good write-up and I like the diagrams. What appears to still be missing in an "off switch". AFAIK there are still no kernel boot time commands to disable eBPF entirely. I have to recompile the kernel to disable it.

    eBPF has the potential for file-less malware to run hidden from detection and I foresee the ability to tickle ring -3 (and -4?) CPU within CPU functions while bypassing local firewalls.

    Here is some example code of what people already know how to do today and this list will grow as people discover more capabilities. [1][2][3][4][5] These do require some privileges to insert but will remain running and hidden until reboot.

    [1] - https://github.com/citronneur/pamspy

    [2] - https://github.com/h3xduck/TripleCross

    [3] - https://github.com/krisnova/boopkit

    [4] - https://github.com/pathtofile/bad-bpf

    [5] - https://doublepulsar.com/bpfdoor-an-active-chinese-global-su...

  5. bad-bpf

    A collection of eBPF programs demonstrating bad behavior, presented at DEF CON 29

    This is a good write-up and I like the diagrams. What appears to still be missing in an "off switch". AFAIK there are still no kernel boot time commands to disable eBPF entirely. I have to recompile the kernel to disable it.

    eBPF has the potential for file-less malware to run hidden from detection and I foresee the ability to tickle ring -3 (and -4?) CPU within CPU functions while bypassing local firewalls.

    Here is some example code of what people already know how to do today and this list will grow as people discover more capabilities. [1][2][3][4][5] These do require some privileges to insert but will remain running and hidden until reboot.

    [1] - https://github.com/citronneur/pamspy

    [2] - https://github.com/h3xduck/TripleCross

    [3] - https://github.com/krisnova/boopkit

    [4] - https://github.com/pathtofile/bad-bpf

    [5] - https://doublepulsar.com/bpfdoor-an-active-chinese-global-su...

  6. falco

    Cloud Native Runtime Security

  7. systemd

    The systemd System and Service Manager

    ```

    https://github.com/systemd/systemd/blob/c76691d708ac7fe13b7c...

    Unfortunately, most of the programs loaded by systemd are more-or-less hand-generated (the ingress/egress programs specifically) and do not include this information.

    It's a surprisingly small group of folks who work in this space upstream, but I know that they're aware of this as an opportunity to improve things :)

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Kubernetes security projects for entry grad roles in DevSecOps/Cloud security

    1 project | /r/kubernetes | 9 Jul 2023
  • Opensource IDS for Kubernetes??

    1 project | /r/kubernetes | 16 Dec 2022
  • Is there a utility that can send shell command to all pods?

    1 project | /r/kubernetes | 12 Nov 2022
  • My GoLab 2022 experience

    1 project | dev.to | 14 Oct 2022
  • What are some good tools for File Integrity Monitoring?

    1 project | /r/kubernetes | 29 Sep 2022

Did you know that C is
the 6th most popular programming language
based on number of references?