Chapter 10. Digging into a Computer with Rootkits

The art of war is simple enough. Find out where your enemy is.


Breaking into a computer isn’t easy, so once a hacker gets in, his first goal is generally to make sure he can get back into that computer easily at any time. The best way to do this is to control a system administrator account on the computer, otherwise known as a root account or just plain root.

To gain and maintain root access, hackers have created special tools called rootkits, which are programs, or groups of programs, designed to punch holes through a computer’s defenses. That way, if a system administrator finds and blocks the first route the hacker used to access the computer, the rootkit will have created several ...

Get Steal This Computer Book 4.0, 4th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.