<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Rootkit on Siti</title><link>https://siti.pages.dev/tags/rootkit/</link><description>Recent content in Rootkit on Siti</description><generator>Hugo</generator><language>id</language><lastBuildDate>Wed, 29 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://siti.pages.dev/tags/rootkit/index.xml" rel="self" type="application/rss+xml"/><item><title>Malware &amp; Rootkit — Teknik Persembunyian Proses</title><link>https://siti.pages.dev/docs/process-hiding/</link><pubDate>Wed, 29 Apr 2026 00:00:00 +0000</pubDate><guid>https://siti.pages.dev/docs/process-hiding/</guid><description>&lt;h2 id="daftar-isi"&gt;Daftar Isi&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#bab-1--teknik-persembunyian-proses"&gt;Bab 1 — Teknik Persembunyian Proses&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#11-argv0-masquerading"&gt;1.1 argv[0] Masquerading&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#12-kernel-thread-spoofing"&gt;1.2 Kernel Thread Spoofing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#13-nama-binary-palsu-di-sistem-path"&gt;1.3 Nama Binary Palsu di Sistem Path&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#14-guard-process--auto-respawn"&gt;1.4 Guard Process &amp;amp; Auto-Respawn&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#15-systemd-service-palsu"&gt;1.5 Systemd Service Palsu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#16-immutable-files-via-chattr"&gt;1.6 Immutable Files via chattr&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#17-ld_preload-hooking"&gt;1.7 LD_PRELOAD Hooking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#18-lkm-rootkit"&gt;1.8 LKM Rootkit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#19-ebpf-rootkit"&gt;1.9 eBPF Rootkit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#110-persistence-via-bashrcprofile"&gt;Bab 1.10 — Persistence via .bashrc/.profile&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#111-perfctl-pola-malware-canggih-di-home"&gt;Bab 1.11 — perfctl: Pola Malware Canggih di $HOME&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#bab-2--cara-deteksi"&gt;Bab 2 — Cara Deteksi&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#21-bandingkan-proc-vs-ps"&gt;2.1 Bandingkan /proc vs ps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#22-deteksi-ghost-process"&gt;2.2 Deteksi Ghost Process&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#23-cek-binary-di-balik-proses"&gt;2.3 Cek Binary di Balik Proses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#24-audit-immutable-files"&gt;2.4 Audit Immutable Files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#25-cek-systemd-services-mencurigakan"&gt;2.5 Cek Systemd Services Mencurigakan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#26-koneksi-jaringan-tersembunyi"&gt;2.6 Koneksi Jaringan Tersembunyi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#27-deteksi-ld_preload-hook"&gt;2.7 Deteksi LD_PRELOAD Hook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#28-deteksi-lkm-rootkit"&gt;2.8 Deteksi LKM Rootkit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#bab-3--penanganan--pembersihan"&gt;Bab 3 — Penanganan &amp;amp; Pembersihan&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#31-urutan-pembersihan-yang-benar"&gt;3.1 Urutan Pembersihan yang Benar&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#32-kill-guard-dulu"&gt;3.2 Kill Guard Dulu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#33-hapus-file-immutable"&gt;3.3 Hapus File Immutable&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#34-bersihkan-persistence"&gt;3.4 Bersihkan Persistence&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#35-blokir-c2-di-etchosts"&gt;3.5 Blokir C2 di /etc/hosts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#bab-4--studi-kasus-nyata"&gt;Bab 4 — Studi Kasus Nyata&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#41-cluster-gs-dbus--softirq"&gt;4.1 Cluster gs-dbus + softirq&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#42-rondo-c2-agent"&gt;4.2 Rondo C2 Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://siti.pages.dev/docs/process-hiding/#43-dropper-resh--pakchoi-backdoor"&gt;4.3 Dropper re.sh + pakchoi Backdoor&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id="bab-1--teknik-persembunyian-proses"&gt;Bab 1 — Teknik Persembunyian Proses&lt;/h2&gt;
&lt;p&gt;Malware modern tidak bisa hanya berjalan — ia harus &lt;strong&gt;tidak terlihat&lt;/strong&gt;. Berikut adalah teknik-teknik yang paling umum digunakan, dari yang paling sederhana hingga yang paling dalam.&lt;/p&gt;</description></item></channel></rss>