1 / 14

Rootkit In Computer Terms?

Learn what is a rootkit and how you can scan, detect and protect your computer. A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software. Get more information at https://blog.reasonsecurity.com/2015/06/08/what-is-a-rootkit/

Download Presentation

Rootkit In Computer Terms?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ROOTKIT IN COMPUTERTERMS?

  2. POINTS OFDISCUSSION What is rootkit? History of rootkit What can a rootkitdo? Howcanarootkitgetonmycomputer? What are the types ofrootkit?

  3. WHAT ISROOTKIT? A rootkit is a collection of computer software, typically malicious,designedtoenableaccesstoacomputeroran area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existenceortheexistenceofothersoftware.

  4. HISTORY OFROOTKIT The term rootkit or root kit originally referred to a maliciously modified set of administrative tools for a Unix-like operating system that granted "root" access. If an intruder could replace thestandardadministrativetoolsonasystemwitharootkit,the intruder could obtain root access over the system whilst simultaneouslyconcealingtheseactivitiesfromthelegitimate systemadministrator.

  5. TheGreekwiretappingcaseof2004–05,alsoreferredtoasGreek Watergate,involvedtheillegaltelephonetappingofmorethan100 mobilephonesontheVodafoneGreecenetworkbelongingmostly tomembersoftheGreekgovernmentandtop-rankingcivil servants. The taps began sometime near the beginning of August 2004 and wereremovedinMarch2005withoutdiscoveringtheidentityofthe perpetrators.

  6. WHAT CAN A ROOTKITDO? Rootkits grant attackers full control over a system, which means they can modify existing software at will—particularly the software designed to detect its presence. As a result, rootkitdetectionisdifficultsincethesoftwareresponsiblefor detectingitisoftenusurpedorblindedbyanattack.

  7. HOW CAN A ROOTKIT GET ON MY COMPUTER? RootkitscaninfiltrateaPCoranycomputerjustlikeregular malware,throughinfectedlinksandwebsitesorbycoming bundled with freesoftware.

  8. WHAT ARE THE TYPES OFROOTKIT? Therearedifferenttypesofrootkits,andtheyareclassified bythewaytheyinfectatargetedsystem.Herearethemost commonly usedones: Kernel moderootkit User mode rootkit Firmwarerootkits

  9. KERNEL MODEROOTKIT These are designed to change the functionality of an operatingsystembyinsertingmalwareontothekernel—the centralpartofanoperatingsystemthatcontrolsoperations between hardware and applications. They pose big threats sincekernelshavethehighestlevelsofprivilegeswithina system.

  10. USER MODEROOTKIT These rootkits are executed by acting as ordinary user programs.Theyaresometimesreferredtoasanapplication rootkitsincetheyoperatewhereapplicationstypicallyrun. Theytendtobeeasiertodeploybutoftenposelessdamage than kernelrootkits.

  11. FIRMWAREROOTKIT Thesetakeadvantageofsoftwareembeddedinasystem’s firmware—routers, network cards, hard drives—which can allow a rootkit to remain hidden for longer since these devicesarenottypicallyinspectedforcodeintegrity.

  12. CONTACTUS Email:info@reasonsecurity.com Website:www.reasonsecurity.com

  13. THANKYOU!

More Related