Transcript Chapter 3
Chapter 3
Rootkits: Sneaky, Stealthy Toolboxes
Outline
What is a Rootkit?
What are Rootkits used for?
Rock Star Rootkit: Sony's famous Malware
How Rootkits Work
Rootkit Scanners
The Simplest Rootkit Removal Technique
What is a Rootkit?
Let's say your computer looks like it is infected
by a virus or by adware, but a scan doesn't
reveal anything.
The solution might lie in a rootkit.
A Rootkit is a technology which hides itself and
other programs and prevents their detection.
What are Rootkits used for?
They are used to make it harder to remove the
malware they hide.
Rock Star Rootkit: Sony's famous
Malware
It started as DRM software: two technologies:
XCP or Mediamax
It “hid” all files whose name started with $sys$
How to tell whether you have a bad CD:
It says “Copy Protected” in the Spine.
On the back it says “Compatible with” and some
system specs.
(see the rest on page 91)
How Rootkits Work
Rootkits conceal the trails that lead to the virus
by modifying the operating system
Rootkit Scanners
Root kit scanners are included in McAfee,
Norton, F-Secure, etc. security utility.
Best to use more than one
Freely available:
F-Secure Blacklight
Rootkit Revealer
Microsoft Windows MaliciousSoftware Removal
Tool
Rootkit Hook Analyzer
The Simplest Rootkit Removal
Technique
Use System Restore (page 99)