From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Detect, remove, and avoid rootkits

Detect, remove, and avoid rootkits

From the course: Ethical Hacking: System Hacking

Detect, remove, and avoid rootkits

- [Instructor] Detecting a rootkit can be difficult as, by their very nature, rootkits avoid discovery. In this segment, we'll review how to detect, remove, and avoid rootkits. First, let's talk about how we can detect a rootkit. Rootkit detectors are "specialized software that essentially act as a host-based intrusion detection system that monitors the activity on a single host." They work by creating a "cryptographic hash of important system files, storing the hash values in a database, and then reporting what files have changed." Most file integrity software supports multiple file types and attributes, all have the same goal, "detecting a change in the integrity of a file." Rootkit detectors include Tripwire, which is a commercial product that monitors file integrity in real time, and advanced intrusion detection environment, which is a free product that runs on any modern Unix system. To monitor the integrity of the files, the software will first "scan the system and initialize…

Contents