chapter 3

8
Chapter 3 Rootkits: Sneaky, Stealthy Toolboxes

Upload: ulric

Post on 05-Jan-2016

24 views

Category:

Documents


0 download

DESCRIPTION

Rootkits: Sneaky, Stealthy Toolboxes. Chapter 3. Outline. What is a Rootkit? What are Rootkits used for? Rock Star Rootkit: Sony's famous Malware How Rootkits Work Rootkit Scanners The Simplest Rootkit Removal Technique. What is a Rootkit?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter 3

Chapter 3

Rootkits: Sneaky, Stealthy Toolboxes

Page 2: Chapter 3

Outline

What is a Rootkit? What are Rootkits used for? Rock Star Rootkit: Sony's famous Malware How Rootkits Work Rootkit Scanners The Simplest Rootkit Removal Technique

Page 3: Chapter 3

What is a Rootkit?

Let's say your computer looks like it is infected by a virus or by adware, but a scan doesn't reveal anything.

The solution might lie in a rootkit. A Rootkit is a technology which hides itself and

other programs and prevents their detection.

Page 4: Chapter 3

What are Rootkits used for?

They are used to make it harder to remove the malware they hide.

Page 5: Chapter 3

Rock Star Rootkit: Sony's famous Malware

It started as DRM software: two technologies: XCP or Mediamax

It “hid” all files whose name started with $sys$ How to tell whether you have a bad CD: It says “Copy Protected” in the Spine. On the back it says “Compatible with” and some

system specs. (see the rest on page 91)

Page 6: Chapter 3

How Rootkits Work

Rootkits conceal the trails that lead to the virus by modifying the operating system

Page 7: Chapter 3

Rootkit Scanners

Root kit scanners are included in McAfee, Norton, F-Secure, etc. security utility.

Best to use more than one Freely available:

F-Secure Blacklight Rootkit Revealer Microsoft Windows MaliciousSoftware Removal

Tool Rootkit Hook Analyzer

Page 8: Chapter 3

The Simplest Rootkit Removal Technique

Use System Restore (page 99)