From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Dissecting rootkits

Dissecting rootkits

- [Instructor] A rootkit is a powerful tool as it allows a malicious actor to have full administrative level control while remaining undetected. In this segment, we'll learn how a rootkit gets onto a system, and then, once in, how they are used. Let's start by outlining the definition of root. To establish deeply and firmly, the part of a plant that attaches to the ground, and find or extract something by rummaging. All of these relate to a rootkit, which is a serious threat. A rootkit is a set of programs that a malicious actor uses to gain access to the root, create a backdoor, and remain undetected in a system for a prolonged period of time, ideally, for years. Malicious actors use rootkits to gather intelligence and then send the information to a server. With the information collected, the malicious actor can launch an attack that gets them further into the network. Rootkits have evolved over time and represent only a part of the cyberthreat landscape. However, many times they're…

Contents