Preview

The Power of Rootkits

Good Essays
Open Document
Open Document
1152 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Power of Rootkits
The Power of Root Kits
ITT Technical Institute
08/17/15

A rootkit is a type of malicious software that has the ability to compromise a computer without the user or operating system knowing it. Rootkits allows malware and viruses to hide out in the open by disguising as files that are necessary that your antivirus program will overlook. A rootkit itself is not dangerous; it is when they are then used to hide malware, viruses, bots, and worms. How rootkits got their name is from the Unix term for the primary administrator account called root, and kit refers to the software pieces that apply the tool. (tools)
For a rootkit to be installed a hacker must gain access to the “root” account by exploiting or obtaining the password by cracking its social engineering. Rootkits were used originally to target UNIX operating systems in the early 90’s. Today, rootkits can be use on other operating systems including windows and mac. Since rootkits are activated even before your operating system boots up, they are very difficult to detect. Therefore, they allow powerful access to the system without the owner knowing it. The way rootkits are installed they’re extremely hard to get rid of. Today rootkits mostly are used to mask malware payloads more effectively. (tools)
Rootkits can contain spyware and other programs that monitor traffic, and keystrokes that can create back doors into the system to attack other machines on the network as well as alter existing systems to escape detection. Late October of 2005, Mark Russinovich security expert of Sysinternals uncovered, that he had a rootkit on his own computer that was installed as a part of the DRM component of a Sony audio CD. Experts were concerned that the practice was more widespread than the public thought. They also worried that attackers could exploit existing rootkits, which can create opportunities for virus writers. Mikko Hypponen, director of AV research for Finnish Firm F-Secure Corp states that "These



Cited: Kassner, M. (n.d.). TechRepublic. Retrieved from 10+ things you should know about rootkits: http://www.techrepublic.com/blog/10-things/10-plus-things-you-should-know-about-rootkits/ Leyden, J. (n.d.). Virtual rootkits create stealth risk. Retrieved from The Register: http://www.theregister.co.uk/2006/03/13/virtual_rootkit/ Rouse, M. (n.d.). Rootkit. Retrieved from Techtarget: http://searchmidmarketsecurity.techtarget.com/definition/rootkit Rouse, M. (n.d.). Rootkit Definition . Retrieved from Tech Target: http://searchmidmarketsecurity.techtarget.com/definition/rootkit tools, P. (n.d.). What is a Rootkit Virus? Retrieved from PC Tools: http://www.pctools.com/security-news/what-is-a-rootkit-virus/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The threat I researched in week 7 was a Trojan horse. It is not a self-replicating threat, but it attaches itself to the cookies and temporary internet file folders of a users’ browser history. It re-routes a user’s log in to a malicious web address. By doing this, it causes users to click on other links that further spreads harmful malware, adware, and spyware to their systems, without them even knowing it. The only way to prevent this is to completely clear your cache, cookies, and temporary internet files folders every time you end an Internet browsing session. Running checks through an anti-virus program can also clean these…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Marketing Plan Phase 1

    • 1309 Words
    • 6 Pages

    References: Marson, Ingrid (2005 11 09). Sony: Why care about rootkits?. ZD.Net UK, Retrieved 04/23/2007, from http://news.zdnet.co.uk/software/0,1000000121,39236480,00.htm…

    • 1309 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Rootkit is association with malware. Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    form 1

    • 430 Words
    • 2 Pages

    In the article rushing game hijacking PCs in vast scheme, a criminal gang is using software tools to inject thousands of PCs in a corporate and government networks. The software they used in face PCs with a program known as coreflood which records keystrokes in steel of information this program makes it possible for gang members to see information like bank balances without having to log into stolen accounts.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    As said by Roger Thompson, chief research officer of AVG, rouge antivirus products are common” The Bad guys are clearly making money at it”. Who hasn’t seen those much hated pop ups stating your computer is infected and needs a scan? Who now is silly enough to actually click on those? One would be surprised. Given that this article was written in 2009, it is still very relevant, and it seems like the more and more we still can’t seem to slow down those pop ups. Although now it seems like those pop ups come out of nowhere without you…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    - Growth market thanks to the development of cybercrime industry and the fact that more and more people use the Internet…

    • 872 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or go unnoticed.…

    • 2909 Words
    • 12 Pages
    Better Essays