• A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise...
    69 KB (7,095 words) - 01:49, 26 May 2025
  • existence, leading to both programs being classified as rootkits. Sony BMG initially denied that the rootkits were harmful. It then released an uninstaller for...
    43 KB (4,321 words) - 19:49, 6 May 2025
  • hypervisor-based rootkit. In 2009, researchers from Microsoft and North Carolina State University demonstrated a hypervisor-layer anti-rootkit called Hooksafe...
    25 KB (2,946 words) - 15:04, 21 February 2025
  • Thumbnail for Hacker
    Social engineering Vulnerability Practice sites HackThisSite Zone-H Malware Rootkit Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke...
    39 KB (4,243 words) - 17:45, 28 March 2025
  • RootkitRevealer is a proprietary freeware tool for rootkit detection on Microsoft Windows by Bryce Cogswell and Mark Russinovich. It runs on Windows XP...
    4 KB (242 words) - 04:33, 28 February 2025
  • AFX Windows Rootkit 2003 is a user mode rootkit that hides files, processes and registry. When the installer of the rootkit is executed, the installer...
    1 KB (80 words) - 08:19, 12 April 2025
  • Thumbnail for Intel Management Engine
    September 2018, yet another vulnerability was published (SA-00125). A ring −3 rootkit was demonstrated by Invisible Things Lab for the Q35 chipset; it does not...
    46 KB (4,428 words) - 21:24, 30 April 2025
  • Turla or Uroboros (Russian: Турла) is a Trojan package that is suspected by computer security researchers and Western intelligence officers to be the product...
    5 KB (398 words) - 17:15, 16 October 2024
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System is a book written by Bill Blunden, published by Jones & Bartlett Publishers...
    4 KB (487 words) - 01:08, 8 February 2024
  • Thumbnail for Storm Worm
    Storm Worm (section Rootkit)
    action the Storm Worm takes is to install the rootkit Win32.agent.dh. Symantec pointed out that flawed rootkit code voids some of the Storm Worm author's...
    14 KB (1,496 words) - 11:48, 21 January 2025
  • revealing confidential information, such as user names and passwords. Rootkit A rootkit is a program that uses low-level, hard-to-detect methods to subvert...
    55 KB (5,962 words) - 12:31, 24 May 2025
  • lightweight system that protects an operating system's kernel hooks from rootkit attacks. It prevents thousands of kernel hooks in the guest operating system...
    2 KB (185 words) - 22:24, 3 July 2022
  • Sony rootkit. Security researchers, beginning with Mark Russinovich in October 2005, have described the program as functionally identical to a rootkit: a...
    31 KB (3,649 words) - 16:25, 21 January 2025
  • Malware (section Rootkits)
    packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent...
    76 KB (7,666 words) - 21:44, 23 May 2025
  • Stuxnet (category Rootkits)
    file that automatically executes the propagated copies of the worm and a rootkit component responsible for hiding all malicious files and processes to prevent...
    138 KB (11,947 words) - 22:50, 24 May 2025
  • and Outlier Security. Hoglund contributed early research to the field of rootkits, software exploitation, buffer overflows, and online game hacking. His...
    13 KB (1,421 words) - 03:51, 5 March 2025
  • nProtect GameGuard (sometimes called GG) is an anti-cheating rootkit developed by INCA Internet. It is widely installed in many online games to block...
    8 KB (649 words) - 15:23, 24 April 2025
  • Thumbnail for Dan Kaminsky
    experts for his work on DNS cache poisoning, for showing that the Sony rootkit had infected at least 568,000 computers, and for his talks at the Black...
    28 KB (2,606 words) - 14:06, 12 December 2024
  • rootkit/process-injection techniques, robust encryption, and a modular architecture known as a "dropper". This decrypts and decompresses the rootkit driver...
    7 KB (760 words) - 18:20, 8 November 2024
  • evaluating others' rootkits and his own work on UPAS Kit and Kronos, though he spoke nothing of his connection to these rootkits. As new rootkits appeared, Hutchins...
    25 KB (2,868 words) - 07:15, 13 May 2025
  • preactivated without user authorization. The software agent behaves like a rootkit, reinstalling a small installer agent into the Windows OS at boot time...
    13 KB (1,315 words) - 15:26, 5 July 2024
  • Thumbnail for Rkhunter
    Rkhunter (redirect from Rootkit Hunter)
    rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of...
    4 KB (321 words) - 08:42, 7 May 2025
  • Blue Pill (software) (category Rootkits)
    Blue Pill is the codename for a rootkit based on x86 virtualization. Blue Pill originally required AMD-V (Pacifica) virtualization support, but was later...
    7 KB (718 words) - 18:59, 13 February 2025
  • Alureon (category Rootkits)
    Alureon (also known as TDSS or TDL-4) is a trojan and rootkit created to steal data by intercepting a system's network traffic and searching for banking...
    13 KB (1,047 words) - 04:10, 19 January 2025
  • XOR DDoS is a Linux Trojan malware with rootkit capabilities that was used to launch large-scale DDoS attacks. Its name stems from the heavy usage of...
    4 KB (372 words) - 08:07, 7 September 2024
  • Thumbnail for Jon Lech Johansen
    WOW". Slashdot. 2005-11-17. Retrieved 2007-08-14. "DVD Jon's Code In Sony Rootkit?". Slashdot. 2005-11-17. Retrieved 2007-08-14. Johansen, Jon Lech (2006-01-08)...
    18 KB (1,881 words) - 10:56, 30 May 2025
  • Information Security Engineer at Google, claimed that "Uplay" DRM is a rootkit and poses a serious security risk. The software installs a browser plugin...
    20 KB (1,993 words) - 01:06, 2 May 2025
  • checking of block devices. This feature is designed to mitigate persistent rootkits. Dependence on proprietary Google Play Services and customizations added...
    353 KB (30,104 words) - 22:41, 25 May 2025
  • international media attention in early 2007. iDefense linked the GinWui rootkit, developed by their leader Tan Dailin (Wicked Rose) with attacks on the...
    12 KB (1,458 words) - 18:24, 4 February 2025
  • performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response. It provides intrusion...
    4 KB (433 words) - 15:11, 15 March 2025