Download presentation
1
Rootkits: Sneaky, Stealthy Toolboxes
Chapter 3 Rootkits: Sneaky, Stealthy Toolboxes
2
Outline What is a Rootkit? What are Rootkits used for?
Rock Star Rootkit: Sony's famous Malware How Rootkits Work Rootkit Scanners The Simplest Rootkit Removal Technique
3
What is a Rootkit? Let's say your computer looks like it is infected by a virus or by adware, but a scan doesn't reveal anything. The solution might lie in a rootkit. A Rootkit is a technology which hides itself and other programs and prevents their detection.
4
What are Rootkits used for?
They are used to make it harder to remove the malware they hide.
5
Rock Star Rootkit: Sony's famous Malware
It started as DRM software: two technologies: XCP or Mediamax It “hid” all files whose name started with $sys$ How to tell whether you have a bad CD: It says “Copy Protected” in the Spine. On the back it says “Compatible with” and some system specs. (see the rest on page 91)
6
How Rootkits Work Rootkits conceal the trails that lead to the virus by modifying the operating system
7
Rootkit Scanners Root kit scanners are included in McAfee, Norton, F-Secure, etc. security utility. Best to use more than one Freely available: F-Secure Blacklight Rootkit Revealer Microsoft Windows MaliciousSoftware Removal Tool Rootkit Hook Analyzer
8
The Simplest Rootkit Removal Technique
Use System Restore (page 99)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.