Skip to Content
Ethical Hacking
book

Ethical Hacking

by Daniel G. Graham
September 2021
Intermediate to advanced
376 pages
9h 25m
English
No Starch Press
Content preview from Ethical Hacking

11BUILDING AND INSTALLING LINUX ROOTKITS

Technology is nothing. What’s important is that you have a faith in people, that they’re basically good and smart, and if you give them tools, they’ll do wonderful things with them.

–Steve Jobs

image

Once hackers have gained access to a machine, they often want to remain undetected. One way to do this is to install a rootkit. A rootkit replaces parts of the operating system with the attacker’s code, which is sort of like pasting a photo of a room over a security camera. For example, a rootkit might replace the operating system function that lists all files with one that lists all files except those the hacker ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Rafay Baloch
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost
Hands on Hacking

Hands on Hacking

Matthew Hickey, Jennifer Arcuri

Publisher Resources

ISBN: 9781098129095Errata Page