In contrast, a root kit hooks itself into the operating system's Application Program Interface (API), where it intercepts the system calls that other programs use to perform basic functions, like accessing files on the computer's hard drive. The root kit is the man-in-the-middle, squatting between the operating system and the programs that rely on it, deciding what those programs can see and do.
It uses that position to hide itself. If an application tries to list the contents of a directory containing one of the root kit's files, the malware will censor the filename from the list. It'll do the same thing with the system registry and the process list.
Despite their increasingly sophisticated design, the current crop of Windows root kits are generally not completely undetectable,because it relies on a device driver, booting in "safe mode" will disable its cloaking mechanism, rendering its files visible.
No comments:
Post a Comment