Rootkits represent a serious threat. Hackers use rootkits as they are a powerful tool, in that they allow full administrator-level control while remaining undetected.
- [Instructor] The definition of root is…establish deeply and firmly,…the part of the plant that attaches itself to the ground…or to a support,…or to find or extract something by rummaging.…All of these relate to a rootkit, which infiltrates…a computer system, creates a backdoor,…takes administrator-level control,…and remains undetected.…Rootkits have been around in some form…for a couple of decades.…Early rootkits provided backdoor access,…but were not very stealthy.…
In some cases, they were able to hide and modify files.…Initial attempts to detect rootkits included programs…such as Tripwire that could detect file modification.…Rootkits, however, have evolved,…and represent only a part of the cyber threat landscape,…but are essential in order to carry out an advanced attack.…Rootkits consist of a small group of programs…that an attacker uses to gain access to the root…while remaining undetected in a system,…ideally, for years.…
Hackers use rootkits to monitor users,…steal data,…gather intelligence,…monitor keystrokes,…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits