From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Using rootkits

Using rootkits

- [Instructor] A rootkit is a collection of utilities that infiltrates a system, creates a backdoor, takes administrator level control, and remains undetected. In this segment, we'll outline how a malicious actor can use a rootkit to modify system integrity. Although mostly associated with malicious actors, rootkits have other legitimate purposes. For example, law enforcement might use it to investigate and collect evidence. Additionally, corporations use rootkit technology to monitor employees' use of computers, but malicious actors also use rootkits, but not for legitimate reasons. Now, breaking into a computer system is hard work. So once a malicious actor has gained access to a system, they'll want to stay in the system so they can monitor communications or launch an attack such as uploading malware. However, if a malicious actor simply wants to get in and stay only long enough to steal something, or if the goal is to cripple a system, they won't take the time to install a…

Contents