Chapter 10. Digging into a Computer with Rootkits

The art of war is simple enough. Find out where your enemy is.

ULYSSES S. GRANT

Breaking into a computer isn’t easy, so once a hacker gets in, his first goal is generally to make sure he can get back into that computer easily at any time. The best way to do this is to control a system administrator account on the computer, otherwise known as a root account or just plain root.

To gain and maintain root access, hackers have created special tools called rootkits, which are programs, or groups of programs, designed to punch holes through a computer’s defenses. That way, if a system administrator finds and blocks the first route the hacker used to access the computer, the rootkit will have created several ...

Get Steal This Computer Book 4.0, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.