rootkit

0

What is Traitorware?

https://www.eff.org

Your digital camera may embed metadata into photographs with the camera's serial number or your location. Your printer may be incorporating a secret code on every page it prints which could be used to identify the printer and potentially the person who used it.

Read more »
lozz's picture
Created by lozz 11 years 22 weeks ago – Made popular 11 years 22 weeks ago
Category: Opposition   Tags:
0

Hunting Rootkits with rkhunter Video Tutorial

http://beginlinux.com

A rootkit is software that is installed on your server with the purpose of hiding the fact that your server has been compromised and providing access to your server so that the intruder can easily return. It is important to understand that in order for an intruder to install a rootkit they will have to have gained the rights to do so on your server.

Read more »
aweber's picture
Created by aweber 12 years 22 weeks ago – Made popular 12 years 22 weeks ago
Category: Beginner   Tags:
0

SSH Key-based Attacks

http://www.us-cert.gov

US-CERT is aware of active attacks against linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as "phalanx2" is installed.

Read more »
akf's picture
Created by akf 13 years 39 weeks ago – Made popular 13 years 39 weeks ago
Category: High End   Tags:

Best karma users