A rootkit contains a set of tools and replacement executables for many of the operating system's critical components, used to hide evidence of the attacker's presence and to give the attacker backdoor access to the system.
Rootkits require root access to to install, but once set up, the attacker can get root access back at any time.
For More Info About ROOKITS, Click Here.
But most of the times, a Sound administrator woudl catch them, very easily with tools available in the market.
The following rootkits, worms and LKMs are currently detected:
01. lrks, lrk3, lrk4, lrk5, lrk6 (and variants); | 02. Solaris rootkit; | 03. FreeBSD rootkit; |
04. torn (and variants); | 05. Ambient's Rootkit (ARK); | 06. Ramen Worm; |
07. rh[67]-shaper; | 08. RSHA; | 09. Romanian rootkit; |
10. RK17; | 11. Lion Worm; | 12. Adore Worm; |
13. LPD Worm; | 14. kenny-rk; | 15. Adore LKM; |
16. ShitC Worm; | 17. Omega Worm; | 18. Wormkit Worm; |
19. Maniac-RK; | 20. dsc-rootkit; | 21. Ducoci rootkit; |
22. x.c Worm; | 23. RST.b trojan; | 24. duarawkz; |
25. knark LKM; | 26. Monkit; | 27. Hidrootkit; |
28. Bobkit; | 29. Pizdakit; | 30. torn v8.0; |
31. Showtee; | 32. Optickit; | 33. T.R.K; |
34. MithRa's Rootkit; | 35. George; | 36. SucKIT; |
37. Scalper; | 38. Slapper A, B, C and D; | 39. OpenBSD rk v1; |
40. Illogic rootkit; | 41. SK rootkit. | 42. sebek LKM; |
43. Romanian rootkit; | 44. LOC rootkit; | 45. shv4 rootkit; |
46. Aquatica rootkit; | 47. ZK rootkit; | 48. 55808.A Worm; |
49. TC2 Worm; | 50. Volc rootkit; | 51. Gold2 rootkit; |
52. Anonoying rootkit; |
Hopes you guys Found it interesting.
Enjoy Hackign Enjoy Hackton
No comments:
Post a Comment