¢нαяℓιє яσσт :arch: :openpepe: 🌶️ on Nostr: #[0] #[1] #[2] > write a RAT or rootkit for OpenBSD OpenBSD does not load kernel ...
npub14x7fjslrldws4en9k5c3ke9xxz9hsx5hlptmzhd43wvsu5kkh3xq52wdx5 (npub14x7…wdx5) ✙ dcc :pedomustdie: :phear_slackware: (npub1lar…q5vr) npub1q7dq8ytkufeukwf6v3cjejpr3j220w5cutwz6xu5s2e07t4z5hpqtcrhg7 (npub1q7d…rhg7)
> write a RAT or rootkit for OpenBSD
OpenBSD does not load kernel modules or kernel objects, that has to be compiled in from the source tree. Also OpenBSD uses KASLR with everything update, patch and reboot. Meaning you have a unique randomized kernel at any given moment or time.
As for a RAT, good luck, "only 2 remote holes found in a default install" in the past 20 years. The wall has yet to be defeated.
> write a RAT or rootkit for OpenBSD
OpenBSD does not load kernel modules or kernel objects, that has to be compiled in from the source tree. Also OpenBSD uses KASLR with everything update, patch and reboot. Meaning you have a unique randomized kernel at any given moment or time.
As for a RAT, good luck, "only 2 remote holes found in a default install" in the past 20 years. The wall has yet to be defeated.