Professional Documents
Culture Documents
Hacker's Methodology:: 1. Rootkits
Hacker's Methodology:: 1. Rootkits
1. Rootkits
A rootkit is software that allows cybercriminals to gain access to your computer, and
you may not even know it. Hackers gain remote access by either stealing your
passwords or infecting your system through phishing attacks. The original purpose of
rootkits was to detect and rectify software flaws. However, hackers use this software or
application for stealing important data by gaining unauthorized access to an operating
system. Rootkits work at the operating system level and can access most of your
computer’s functions and take complete control