Language Selection

English French German Italian Portuguese Spanish

How A rootkit Exactly Works

Filed under
Security

How A rootkit Exactly Works
By drendeah

When a hacker gains local acess to your computer, and then escalates himself to root, he will often install a rootkit.

Now, we have all heard of the term rootkit before but I know a lot of us don't know exactly how one works.

Let me take you step by step, how a hacker would install a rootkit. For this example we will use the dica rootkit, which is a variant of the popular t0rn rootkit. (For obvious reasons I am blocking the URL to download it.)

For the full article visit How_A_rootkit_Exactly_Works




More in Tux Machines

Leftovers: Gaming

Leftovers: Software

today's howtos

ACPI, kernels and contracts with firmware

This ends up being a pain in the neck in the x86 world, but it could be much worse. Way back in 2008 I wrote something about why the Linux kernel reports itself to firmware as "Windows" but refuses to identify itself as Linux. The short version is that "Linux" doesn't actually identify the behaviour of the kernel in a meaningful way. "Linux" doesn't tell you whether the kernel can deal with buffers being passed when the spec says it should be a package. "Linux" doesn't tell you whether the OS knows how to deal with an HPET. "Linux" doesn't tell you whether the OS can reinitialise graphics hardware. Read more