diff --git a/3_RootkitTechniques/3.7_char_interfering/README.md b/3_RootkitTechniques/3.7_char_interfering/README.md index ac3856c..aa716a8 100644 --- a/3_RootkitTechniques/3.7_char_interfering/README.md +++ b/3_RootkitTechniques/3.7_char_interfering/README.md @@ -15,3 +15,5 @@ * Read some bytes from `/dev/urandom` with `dd if=/dev/urandom bs=1 count=128 | xxd` * Observe that both reads return nothing but `0x00`! * Unload with `rmmod rootkit` + +![random](./random.png "Interfering with char devices") diff --git a/3_RootkitTechniques/3.7_char_interfering/random.png b/3_RootkitTechniques/3.7_char_interfering/random.png new file mode 100644 index 0000000..5d265eb --- /dev/null +++ b/3_RootkitTechniques/3.7_char_interfering/random.png Binary files differ