11BUILDING AND INSTALLING LINUX ROOTKITS

Technology is nothing. What’s important is that you have a faith in people, that they’re basically good and smart, and if you give them tools, they’ll do wonderful things with them.

–Steve Jobs

image

Once hackers have gained access to a machine, they often want to remain undetected. One way to do this is to install a rootkit. A rootkit replaces parts of the operating system with the attacker’s code, which is sort of like pasting a photo of a room over a security camera. For example, a rootkit might replace the operating system function that lists all files with one that lists all files except those the hacker ...

Get Ethical Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.