Rootkits, papers, security, rootkits
[ Pobierz całość w formacie PDF ]
ISA 564
SECURITY LAB
Rootkits: Attacks and Defense
Outline
Introduction
Rootkit Basics
Advanced Rootkit Techniques
Defense
What is a Rootkit?
“
A rootkit is a set of programs and code that allows
a permanent or consistent, undetectable presence
on a computer
”
Goals:
Hide malicious resources
(
e.g., processes, files, registry
keys, open ports, etc.
)
Provide hidden backdoor access
What a Rootkit Is & Isn’t
A rootkit does
NOT
compromise a host by itself
An exploit must be used to gain access to the host before a
rootkit can be deployed
The purpose of a rootkit is
NOT
to gain access to a
system, but to preserve existing access
Rootkits hide processes, ports, files, and other resources
from the OS and security programs
Brief History
Early rootkits targeted UNIX OSes
First “rootkit” appeared on SunOS in 1994
Replaced
login
,
ls
,
ps
,
netstat
, etc. to give an attacker hidden
access
“Kits” to attain and maintain “root” access to machines
Eventually moved towards other platforms and kernel
Windows popularity brought Windows rootkits
[ Pobierz całość w formacie PDF ]
Tematy
- Indeks
- Ryszard Zieba-European Security and Defence Identity. The polish Viewpoint,
- Rootkity Sabotowanie jadra systemu Windows rootki, Bezpieczeństwo Systemów
- RocknRolla, â MOJE PLIKIâ Haslo; 13piatek, â NAPISY DO FILMOW â
- Russian Pacific Fleet History, 01.Monografie
- Rufin Jean Christophe - Zapach Adama, !!! 2. Do czytania, !!!. !.Kryminał i sensacja
- Rozdział 2, âŚâŹmoje tłumaczeniaâŹâŚ, Trwające, Trwające Gena Showalter - Alien Huntress 03 - Savor Me Slowly
- Rozdzielnice średniego napięcia w izolacji SF6 typu ZX (2009), Elektryka, Katalogi, ABB
- Rudyard Kipling - Księga dżungli, ⏠K
- Running IPv6 (2008), CEH + PEN TEST
- Rozpoczęcie, duchowo
- zanotowane.pl
- doc.pisz.pl
- pdf.pisz.pl
- pomorskie.pev.pl