From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

User Mode and Kernel Mode

User Mode and Kernel Mode

- [Instructor] Rootkits are almost always designed to operate with superuser privileges, which are normally reserved for the system administrator or root user. In this segment, we'll compare user-mode and kernel-mode rootkits, and outline the benefits and drawbacks of each type. First, let's discuss what makes a good rootkit and how they avoid detection. A good rootkit will sniff passwords, create hidden directories, and be able to avoid any security measures designed to pick up any activity as it communicates with the network. Identifying rootkit behavior can be difficult, as a rootkit is designed to avoid being detected by deleting any evidence of processes the attacker has generated, and even remove the rootkit when the job is complete. Many times, they're only identified by a rootkit scanner. So, now let's further discuss how a rootkit can stay hidden. To avoid detection, a rootkit can either use an active or passive approach. An active offense involves taking direct actions that…

Contents