![]() To store other malicious programs on the system and act as a server resource for bot updates.from the system to which attackers might be restricted or possess no access. To gather sensitive data, network traffic, etc.To mask attacker tracks and presence of malicious applications or processes.To root the host system and gain remote backdoor access.Launching zero day attack (privilege escalation, buffer overflow, Windows kernel exploitation, etc.). ![]() Installing it on the public computers or corporate computers through social engineering.Wrapping it in a special package like games.Scanning for vulnerable computers and servers on the web.A typical rootkit comprises backdoor programs, DDoS programs, packet sniffers, log-wiping utilities, IRC bots, etc.Rootkits replace certain operating system calls and utilities with its own modified versions of those routines that in turn undermine the security of the target system causing malicious functions to be executed. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |