1
0
mirror of https://github.com/takeshixx/redstar-tools synced 2025-07-18 04:53:22 +00:00
This commit is contained in:
takeshix
2015-12-29 03:02:35 +01:00
parent a37b971d3c
commit f1b1cb04a8

View File

@ -1,3 +1,51 @@
# Tools for Red Star OS (붉은별) # Tools for Red Star OS (붉은별)
This repository includes several binaries from and tools for Red Star OS. These can be used for further research work. This repository includes several binaries from and tools for Red Star OS. These can be used for further research work.
## Disable malicious components
1. Get root privileges via `/usr/sbin/rootsetting`
2. Kill `securityd`
Killing `securityd` will prevent the system from rebooting when editing/deleting various protected files.
```
killall -9 securityd
```
3. Disable `rtscan` kernel module
Either via `resctl.py` (see rtscan) or via a Python shell as follows:
```
[root@localhost ~]# python
Python 2.6 (r26:66714, Oct 7 2012, 13:39:47)
[GCC 4.4.0 20090506 (Red Hat 4.4.0-4)] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> import fcntl
>>> fcntl.ioctl(open('/dev/res', 'wb'), 29187)
0
```
After disabling `rtscan` protected processes like `opprc` will become killable.
4. Kill `scnprc` and `opprc`
```
killall scnprc
killall opprc
```
5. Replace `/usr/lib/libos.so.0.0.0`
See `libos` for further information. Replacing this file will prevent the system from rebooting via `securityd` after rebooting the system. It also will prevent reboot loops by `kdm` rendering the system unusable.
6. Delete `/usr/share/autostart/scnprc.desktop`
Deleting this file will prevent `kdeinit` from starting the framework after a system reboot.
7. Reboot the system
## Disclaimer
All of the information is based on reasearch dedicated to analyzing Red Star OS. The authors take no responsibility for the accuracy, completeness or quality of the information provided.