Please enable JavaScript.
Coggle requires JavaScript to display documents.
Rootkits (Outline (Classification (User-level rootkits (Alter binary…
Rootkits
Outline
-
-
Classification
User-level rootkits
-
-
-
Normally, in form of trojans
-
-
-
-
Useful for example to hide processes, files
or logs
Kernel-level rootkits
Targets code and data within the OS
kernel, e.g. LKM
-
-
Do not modify user applications, but the
kernel functions they use
-
-
-
-
Hooking techniques
-
-
-
IDT hooking
-
Hooking
-
Each time the interrupt occurs, the malicious
handler is loaded
-
-