reverse engineering - How RootKit works internally in our operating system? -
as know rootkit kind of malware designs enable access computer or areas of software not otherwise allowed unauthorized user , masks existence or existence of other software.
once installed, becomes possible hide intrusion maintain privileged access. key root or administrator access. full control on system means existing software can modified, including software might otherwise used detect or circumvent it.
how works internally in our operating system, how uses resources of operating system such memory, cpu etc,how hides internally?
any idea appreciated.
thanks in advance.
Comments
Post a Comment