Root kit
A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Linux operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware.
Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e. exploiting a known vulnerability, password (either by cracking, privilege escalation, or social engineering). Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.
Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. Detection methods include using an alternative and trusted operating system, behavioral-based methods, signature scanning, difference scanning, and memory dump analysis. Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel; reinstallation of the operating system may be the only available solution to the problem. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment.

This is an excerpt from the article Root kit from the Wikipedia free encyclopedia. A list of authors is available at Wikipedia.
The article Root kit at en.wikipedia.org was accessed 161 times in the last 30 days. (as of: 11/26/2013)
Images on Root kit
Preview image:
Original:
Search results from Google and Bing
1
1
1
Rootkit - Wikipedia, the free encyclopedia
A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and ...
en.wikipedia.org/wiki/Rootkit
3
9
2
Free Rootkit Detection and Removal | Sophos Anti-Rootkit Tool
Free Sophos Anti-Rootkit Scans, Detects and Removes Rootkits Hidden On Your Computer Using Advanced Rootkit Detection Techology.
www.sophos.com/products/free-tools/sophos-anti-rootkit.html
5
24
3
RootkitRemover | McAfee Free Tools
McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware.
www.mcafee.com/us/downloads/free-tools/rootkitremover.aspx
2
>30
4
Malwarebytes : Malwarebytes Anti-Rootkit BETA
Download Malwarebytes Anti-Rootkit from the link above; Run the file and follow the onscreen instructions to extract it to a location of your choosing (your ...
www.malwarebytes.org/antirootkit/
4
>30
5
Rootkit Buster - Trend Micro
www.trendmicro.com/download/rbuster.asp
6
>30
6
What is rootkit? - A Word Definition From the Webopedia Computer ...
This page describes the term rootkit and lists other pages on the Web where you can find additional information.
www.webopedia.com/TERM/R/rootkit.html
7
>30
7
What is a Rootkit Virus? | Security News - PC Tools
Click here to learn about Rootkit Virus threats at the PC Tools Security News blog . Learn more about web security, how to keep your computer safe, and the ...
www.pctools.com/security-news/what-is-a-rootkit-virus/
8
>30
8
What is rootkit? | FAQ | AVG Worldwide
Rootkit is an application (or set of applications), that hides its presence or presence of another application (virus, spyware, etc.) on the computer, using some of ...
www.avg.com/ww-en/faq.num-2353
9
>30
9
Rootkit.nl - Protect your machine
Open-source GPL rootkit scanner for Unix-like systems. Scans for rootkits, trojans , backdoors and local exploits. Tests include scanning of plaintext and binary ...
www.rootkit.nl/
10
>30
10
10+ things you should know about rootkits - TechRepublic
Sep 17, 2008 ... Breaking the term rootkit into the two component words, root and kit, is a useful way to define it. Root is a UNIX/Linux term that's the equivalent ...
www.techrepublic.com/blog/10-things/10-plus-things-you-should-know-about-rootkits/
Search results for "Root kit"
Google: approx. 26.900.000
Root kit in science
Rootkit Detection | University of Miami
Rootkits help intruders maintain access to a system without the user's knowledge. These tools are used by malicious intruders to control, attack, or ferret ...
Recognizing and Recovering from Rootkit Attacks
Wright State University ... Installing Rootkit is one of the more popular activities of serious Internet intruders once they have obtained root ... However, Rootkit is really a collection of programs whose purpose is to allow an intruder to install and ...
UPS Rootkit & Trojan removal — University Computing Service
Study at Cambridge; About the University; Research at Cambridge .... Later variants just seem to have the ntos Root kit component as per the McAfee URL above.
The Abstract :: North Carolina State University :: Clickjacking ...
Jul 2, 2012 ... But the rootkit's functionality is not limited to replacing the browser – it could be used to hide and replace any or all of the apps on a smartphone ...
[PDF]Automated Defense from Rootkit Attacks - VMware
1. Automated Defense from Rootkit Attacks. Arati Baliga and Liviu Iftode. Computer Science Department. Rutgers University. 110 Frelinghuysen Road ...
[PDF]A COMPARATIVE ANALYSIS OF ROOTKIT DETECTION ...
The University of Houston, Clear Lake, 2011. Thesis Chair: Dr. T. Andrew Yang, Ph.D. A rootkit is a type of malware that is designed to gain administrator-level.
Rutgers Researchers Show New Security Threat Against 'Smart ...
Feb 22, 2010 ... University have shown how a familiar type of personal computer security ... Rootkit attacks on smart phones or upcoming tablet computers
Understanding Rootkits: Using Memory Dump Analysis for Rootkit ...
Nov 13, 2013 ... Every rootkit employs a wide range of masquerading techniques to ..... rootkit. Dmitry Korolev graduated St-Petersburg State University and is a ...
RBACS: Rootkit Behavioral Analysis and Classification System
RBACS: Rootkit Behavioral Analysis and Classification System ... Griffith University copyright notice. Copyright in individual works within the repository belongs ...
Researchers create “clickjack rootkit” for Android that hijacks apps ...
Jul 3, 2012 ... Researchers at North Carolina State University have demonstrated a prototype rootkit for Google's Android operating system that can “clickjack” ...
Books on the term Root kit
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Bill Blunden, 2012
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootki...
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
Greg Hoglund, James Butler, 2006
A guide to rootkits describes what they are, how they work, how to build them, and how to detect them.
Homemade Root Beer, Soda & Pop
Homemade Root Beer, Soda & Pop
1998
“This how-to book should appeal to those who don’t mind spending two hours to make a dozen bottles of signature soda.” — Kansas City Star “Yes, there is fun and adventure in the world of soft drinks, which Stephen Cresswell proves.” — Pittsburgh “This book gets an A+. A good variety of old fashioned recipes.” — American Herb Association “There’s a ...
The Rootkit Arsenal: Escape and Evasion
The Rootkit Arsenal: Escape and Evasion
Bill Blunden, 2009
Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available.
The Ultimate Obama Survival Guide: How to Survive, Thrive, and Prosper During Obamageddon
The Ultimate Obama Survival Guide: How to Survive, Thrive, and Prosper During Obamageddon
2013
“Wayne Root is one libertarian I like! (Because he’s left his childish games behind and become a full-fledged conservative.) In The Ultimate Obama Survival Guide Wayne dissects the coming economic collapse under his old Columbia college classmate Obama and shows you how to capitalize and prosper through hell.”—Ann Coulter, bestselling author of Hig...
Rootkits For Dummies
Rootkits For Dummies
Larry Stevenson, Nancy Altholz, 2006
Realizing that it's not the OS's fault — it's been brainwashed } Checking out WinPE and Linux-bootable CDs } Reviewing some rootkit-detection tools After you have all the basic security elements in place (as described in earlier chapters ), you ...
Homemade Soda: 200 Recipes for Making & Using Fruit Sodas & Fizzy Juices, Sparkling Waters, Root Beers & Cola...
Homemade Soda: 200 Recipes for Making & Using Fruit Sodas & Fizzy Juices, Sparkling Waters, Root Beers & Cola...
Andrew Schloss, 2011
"As the seasoned author of 15 successful cookbooks (e.g., Art of the Slow Cooker), Schloss does not disappoint here. This collection contains 200 recipes for carbonated beverages, ranging from the expected (Rooty Toot Root Beer) to the gourmet (Spiced Balsamic Fig Sparkler). In addition to the soda recipes, Scholss devotes two chapters to food...
Analysis of Automated Rootkit Detection Methodologies
Analysis of Automated Rootkit Detection Methodologies
Eugene Chuvyrov, 2011
The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies.
Development of Google searches


Blog posts on the term
Root kit
Zeus Variant Includes Root Kit and Advanced Evasion Capabilities | The State of Security
www.tripwire.com/state-of-security/top-security-stories/zeus-variant-includes-root-kit-advanced-evasion-capabilities/
New Linux Rootkit Emerges | Beacon Technologies
www.beaconnet.com/new-linux-rootkit-emerges/
Motorola Appears to be Pushing Kit Kat to the DROID MAXX and ULTRA Again | Droid Life
by Kellex on Jan 13, 2014January 13, 2014 News.
www.droid-life.com/2014/01/13/motorola-appears-to-be-pushing-kit-kat-to-the-droid-maxx-and-ultra-again/
Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection | Forensic Focus - Articles
Dmitry Korolev, Yuri Gubanov, Oleg Afonin research@belkasoft.com © Belkasoft Research, 2013 Every rootkit employs a wide range of masquerading techniques to prevent its detection. Anti-virus and anti-malware tools must perform what is called, in forensic terms, "live box analysis", performing a real-time scan of a live system. No wonder rootkits can actively resist detection by…
articles.forensicfocus.com/2013/11/22/understanding-rootkits/
64-Bit Version of ZeuS Comes with Improved Evasion, Rootkit CapabilitiesIT Security News aggregated | IT Security News aggregated
Back in December 2013, Kaspersky reported spotting a 64-bit version of the notorious ZeuS banking Trojan. At the time, experts revealed that the threat was relying on Tor in order to protect its command and control infrastructure.
itsecuritynews.info/2014/01/08/64-bit-version-of-zeus-comes-with-improved-evasion-rootkit-capabilities/
Rootkit Virus/bootmgr Is Missing - Bitdefender Forum
forum.bitdefender.com/index.php?showtopic=51294
Kaspersky TDSSKiller Portable 3.0.0.19 (rootkit remover) Released | PortableApps.com - Portable software for USB, portable and cloud drives
portableapps.com/news/2013-11-18--kaspersky-tdsskiller-portable-3.0.0.19-released
Malwarebytes Anti-Rootkit 1.7.0.1008 Beta - Neowin
Malwarebytes Anti-Rootkit (MBAR) is a tool designed to detect and remove sophisticated, stealthy forms of malware called “Rootkits”. Scan to check for rootkits that includes drivers, MBRs and VBRs.
www.neowin.net/news/malwarebytes-anti-rootkit-1701008-beta
Rootkit infection detected - Cyber Tech Help Support Forums
Rootkit infection detected Malware Removal Forum
www.cybertechhelp.com/forums/showthread.php?t=223505
123