What is a Rootkit?
Designed to gain administrative level control over a given computer system without being detected
What does the Administrative account do?
Allows the person to install programs, delete programs, open ports, shut ports, and do whatever it is they want to do on that system
What is a technique used by Rootkits to gain a deeper level of access on computer systems?
DLL Injection
What is a Dynamic Link Library (DLL)?
Collection of code and data that can be used by multiple programs simultaneously to allow for code reuse and modularization in software development
What is a DLL Injection?
Technique used to run arbitrary code within the address space of another process by forcing it to load an infected dynamic-link library
What is Shim?
Piece of software code that is placed between two components and that intercepts the calls between those components and can be used to redirect them
What are the different rings of permission throughout a computer system?
Ring 0, Ring 1, Ring 3
What is Ring 3 (Outermost Ring)?
Where user level permissions are used
What is Ring 1?
You login as the administrator or root user on a system, you have root permission
What is Ring 0 (Innermost or Highest Permission Level)?
This is Kernal mode, which allows a system to control access to things like device drivers, your sound card, your video display or monitor, and other similar things
What does the Rootkit do once installed on a system?
It tries to move from Ring 1 to Ring 0 so that it can hide from other functions of the operating system to avoid detection
How can you detect a Rootkit?
The best way is to boot from an external device and then scan the internal hard drive to ensure that you can detect those rootkits using a good anti-malware scanning solution from a live boot Linux distribution