Results 1 to 6 of 6

Thread: Rootkit Overview

  1. #1
    AO Security for Non-Geeks tonybradley's Avatar
    Join Date
    Aug 2002
    Posts
    830

    Rootkit Overview

    Rootkits, as we know them now, came into being sometime in the mid 1990s. At that time, Sun operating system UNIX system administrators started seeing strange server behavior, missing disk space, CPU cycles and network connections that strangely did not show up in command netstat. By implementation technology, three main classes of Rootkits are available today: binary kits, kernel kits and library kits. The first class achieves its goal by replacing certain system files with their Trojan counterparts. The second uses kernel components (also called modules) or Trojans, and the third employs system library Trojans. Rootkits found in the wild (such as captured on Honeypots), often combine Trojaned binaries with higher "security" provided by the kernel and library components.

    MORE
    The paper is from iDefense and gives a pretty good description of the different types of rootkits and how they work.

  2. #2
    Senior Member
    Join Date
    Jul 2002
    Posts
    744
    Don't know why you got negged, just finished reading the paper, good read, thanks.
    Every now and then, one of you won't annoy me.

  3. #3
    AO Security for Non-Geeks tonybradley's Avatar
    Join Date
    Aug 2002
    Posts
    830
    I got negged for bumping the message up without cause. I am not sure who negged me though. It was purely accidental- mouse was pointing at the wrong spot when I accidentally clicked the button. I didn't even know what the Bump Up button did.

    Antipoints come and antipoints go- c'est la vie!

  4. #4
    Senior Member tampabay420's Avatar
    Join Date
    Aug 2002
    Posts
    953
    nice read, thanx
    yeah, I\'m gonna need that by friday...

  5. #5
    Excellent.........that is why I come to this site.
    Share the knowledge

    Peace

    GG

  6. #6
    Senior Member
    Join Date
    Mar 2003
    Posts
    452
    Very useful and informative paper, thanks for the post.


    PuRe
    Like this post? Visit PuRe\'s Information Technology Community. We\'ve also got some kick ass Technology Forums. Shop for books and dvds on LiveWebShop.com

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •