A rootkit takes administrator-level control while remaining undetected. A rootkit modifies software so that it makes incorrect decisions. A hacker can modify software integrity by creating an Easter egg, sending out a bogus patch, or by using browser hook
- [Instructor] A rootkit is a collection of utilities…that infiltrates a computer system,…creates a backdoor,…takes administrator level control…and remains undetected.…Although mostly associated with hackers,…rootkits have other legitimate purposes.…For example, law enforcement might use it…to investigate and collect evidence…and corporations use rootkit technology…to monitor employees' use of computers.…
Black hat hackers use rootkits…but not for legitimate reasons.…Breaking into a computer system is hard work.…So once a hacker has gained access to a system,…the hacker will want to stay in the system undetected…so they can monitor communications or launch an attack…such as uploading malware.…However, if an attacker simply wants to get in…and stay only long enough to steal something…or if the goal is to cripple a system,…a hacker won't take time to install a rootkit.…
A rootkit is a powerful tool…and includes the ability to allow a hacker…to execute command and control functions…along with eavesdropping.…Command and control seeks to take over the system…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits