reverse engineering - How RootKit works internally in our operating system? -


as know rootkit kind of malware designs enable access computer or areas of software not otherwise allowed unauthorized user , masks existence or existence of other software.

once installed, becomes possible hide intrusion maintain privileged access. key root or administrator access. full control on system means existing software can modified, including software might otherwise used detect or circumvent it.

how works internally in our operating system, how uses resources of operating system such memory, cpu etc,how hides internally?

any idea appreciated.

thanks in advance.


Comments

Popular posts from this blog

php - trouble displaying mysqli database results in correct order -

depending on nth recurrence of job in control M -

sql server - Cannot query correctly (MSSQL - PHP - JSON) -