Rootkits (Part 2): Overview

Rootkit techniques are used by malicious software (malware) to hide their presence on an infected system. In this video, Sourcefire Chief Scientist, Zulfikar Ramzan, describes the high level techniques used by kernel-mode and user-mode rootkits. These techniques include direct code modification, import address table hook, system services dispatch table, and direct kernel object modification.

RunTime - 13:36

Uploaded - 18 Jul 2013


©2014 Cisco and/or its affiliates. All rights reserved.