Most attackers use root kits to carry out their objectives.

Root kits tend to be defined as a suite of tools containing the following four elements:

1. vulnerability scanner/exploiter (break in...