rootkit

0

What is Traitorware?

https://www.eff.org

Your digital camera may embed metadata into photographs with the camera's serial number or your location. Your printer may be incorporating a secret code on every page it prints which could be used to identify the printer and potentially the person who used it.

Read more »
lozz's picture
Created by lozz 13 years 40 weeks ago – Made popular 13 years 40 weeks ago
Category: Opposition   Tags:
0

Hunting Rootkits with rkhunter Video Tutorial

http://beginlinux.com

A rootkit is software that is installed on your server with the purpose of hiding the fact that your server has been compromised and providing access to your server so that the intruder can easily return. It is important to understand that in order for an intruder to install a rootkit they will have to have gained the rights to do so on your server.

Read more »
aweber's picture
Created by aweber 14 years 41 weeks ago – Made popular 14 years 40 weeks ago
Category: Beginner   Tags:
0

SSH Key-based Attacks

http://www.us-cert.gov

US-CERT is aware of active attacks against linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as "phalanx2" is installed.

Read more »
akf's picture
Created by akf 16 years 5 weeks ago – Made popular 16 years 5 weeks ago
Category: High End   Tags:

Best karma users