O'Reilly logo

Steal This Computer Book 4.0, 4th Edition by Wallace Wang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Digging into a Computer with Rootkits

The art of war is simple enough. Find out where your enemy is.

ULYSSES S. GRANT

Breaking into a computer isn’t easy, so once a hacker gets in, his first goal is generally to make sure he can get back into that computer easily at any time. The best way to do this is to control a system administrator account on the computer, otherwise known as a root account or just plain root.

To gain and maintain root access, hackers have created special tools called rootkits, which are programs, or groups of programs, designed to punch holes through a computer’s defenses. That way, if a system administrator finds and blocks the first route the hacker used to access the computer, the rootkit will have created several ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required