Description:
Rootkits are programs used by hackers to retain control over systems they have compromised. These programs ensure that even after the original vulnerability, the hacker used to root the system is patched, the hacker can still retain root access on the victim machine. Rootkits have to be inherently stealthy in order to cover their own presence and also of the activities the hacker might carry out on the victim computer at a later time. Thus, Rootkits incorporate mechanisms to hide processes, windows services and even network activity. All this is done to ensure that the victim never gets suspicious that something is wrong on his computer. Because if he does, he might run thorough AV scans and remove the malware installed.
In this first video,
Corey from WatchGuard covers the basics of rootkits and delves deep into Hacker Defender. He runs us through the Hacker Defender configuration file and shows how to make modifications in order to hide processes, services and other important detection metrics. The voice and video are out of sync in the first video so please bear with us. The content is very good, so might just make it worth it. Thanks to
SecuMania.org for posting these videos.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments:
Dead Links :(
Dead Links :(