From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Dissecting rootkits
From the course: Ethical Hacking: System Hacking
Dissecting rootkits
- [Instructor] A rootkit is a powerful tool as it allows a malicious actor to have full administrative level control while remaining undetected. In this segment, we'll learn how a rootkit gets onto a system, and then, once in, how they are used. Let's start by outlining the definition of root. To establish deeply and firmly, the part of a plant that attaches to the ground, and find or extract something by rummaging. All of these relate to a rootkit, which is a serious threat. A rootkit is a set of programs that a malicious actor uses to gain access to the root, create a backdoor, and remain undetected in a system for a prolonged period of time, ideally, for years. Malicious actors use rootkits to gather intelligence and then send the information to a server. With the information collected, the malicious actor can launch an attack that gets them further into the network. Rootkits have evolved over time and represent only a part of the cyberthreat landscape. However, many times they're…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.