Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
How A rootkit Exactly Works
When a hacker gains local acess to your computer, and then escalates himself to root, he will often install a rootkit.
Now, we have all heard of the term rootkit before but I know a lot of us don't know exactly how one works.
Let me take you step by step, how a hacker would install a rootkit. For this example we will use the dica rootkit, which is a variant of the popular t0rn rootkit. (For obvious reasons I am blocking the URL to download it.)
For the full article visit How_A_rootkit_Exactly_Works