Rootkit: What is a Rootkit and How to Detect It | Veracode (2024)

Rootkit: What is a Rootkit and How to Detect It | Veracode (1) Rootkit: What is a Rootkit and How to Detect It | Veracode (2)

APPLICATION SECURITY

Knowledge Base

Search Our Knowledge Base

AppSec Knowledgebase Categories >

Home AppSec Knowledgebase Rootkit: What is a Rootkit?

Rootkit: What Is a Rootkit, Scanners, Detection and Removal Software

What Is a Rootkit?

A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes.

What Can a Rootkit Do?

A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.

State of Software Security 2023

Read the Report

Rootkit Detection

It is difficult to detect rootkits. There are no commercial products available that can find and remove all known and unknown rootkits. There are various ways to look for a rootkit on an infected machine. Detection methods include behavioral-based methods (e.g., looking for strange behavior on a computer system), signature scanning and memory dump analysis. Often, the only option to remove a rootkit is to completely rebuild the compromised system.

Rootkit Protection

Many rootkits penetrate computer systems by piggybacking with software you trust or with a virus. You can safeguard your system from rootkits by ensuring it is kept patched against known vulnerabilities. This includes patches of your OS, applications and up-to-date virus definitions. Don't accept files or open email file attachments from unknown sources. Be careful when installing software and carefully read the end-user license agreements.

Well-Known Rootkit Examples

  • Lane Davis and Steven Dake - wrote the earliest known rootkit in the early 1990s.
  • NTRootkit – one of the first malicious rootkits targeted at Windows OS.
  • HackerDefender – this early Trojan altered/augmented the OS at a very low level of functions calls.
  • Machiavelli - the first rootkit targeting Mac OS X appeared in 2009. This rootkit creates hidden system calls and kernel threads.
  • Greek wiretapping – in 2004/05, intruders installed a rootkit that targeted Ericsson's AXE PBX.
  • Zeus, first identified in July 2007, is a Trojan horse that steals banking information by man-in-the-browser keystroke logging and form grabbing.
  • Stuxnet - the first known rootkit for industrial control systems
  • Flame - a computer malware discovered in 2012 that attacks computers running Windows OS. It can record audio, screenshots, keyboard activity and network traffic.

Secure Coding Handbook

Get the Handbook

Questions About Software Security?

Schedule a Demo

Rootkit: What is a Rootkit and How to Detect It | Veracode (2024)
Top Articles
These Are the 5 Tech Stocks in Warren Buffett’s Portfolio: Should You Invest?
All the UK airports with new hand luggage liquid rules
Tiny Tina Deadshot Build
Tryst Utah
123 Movies Black Adam
Chicago Neighborhoods: Lincoln Square & Ravenswood - Chicago Moms
Voorraad - Foodtrailers
Best Restaurants Ventnor
ExploreLearning on LinkedIn: This month's featured product is our ExploreLearning Gizmos Pen Pack, the…
Sky X App » downloaden & Vorteile entdecken | Sky X
The Cure Average Setlist
Wal-Mart 140 Supercenter Products
Aspen Mobile Login Help
Virginia New Year's Millionaire Raffle 2022
Craigslist Portland Oregon Motorcycles
V-Pay: Sicherheit, Kosten und Alternativen - BankingGeek
Busted Campbell County
Happy Life 365, Kelly Weekers | 9789021569444 | Boeken | bol
Great Clips Grandview Station Marion Reviews
Mj Nails Derby Ct
Hannaford To-Go: Grocery Curbside Pickup
Riversweeps Admin Login
Greyson Alexander Thorn
Kirsten Hatfield Crime Junkie
Prep Spotlight Tv Mn
Drying Cloths At A Hammam Crossword Clue
Rural King Credit Card Minimum Credit Score
Cinema | Düsseldorfer Filmkunstkinos
Citibank Branch Locations In Orlando Florida
October 19 Sunset
Fedex Walgreens Pickup Times
Weekly Math Review Q4 3
Solemn Behavior Antonym
Autozone Locations Near Me
Bbc Gahuzamiryango Live
How to Draw a Sailboat: 7 Steps (with Pictures) - wikiHow
1v1.LOL Game [Unblocked] | Play Online
Topos De Bolos Engraçados
Frommer's Philadelphia & the Amish Country (2007) (Frommer's Complete) - PDF Free Download
Anderson Tribute Center Hood River
Stranahan Theater Dress Code
Doublelist Paducah Ky
Levi Ackerman Tattoo Ideas
Access to Delta Websites for Retirees
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Hampton Inn Corbin Ky Bed Bugs
sin city jili
Duffield Regional Jail Mugshots 2023
Laurel Hubbard’s Olympic dream dies under the world’s gaze
Escape From Tarkov Supply Plans Therapist Quest Guide
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 5707

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.