
Traditional RootKits
¨A suite of tools that allow an attacker to maintain root-level access via a backdoor and hiding evidence of a system compromise
¨More powerful than
application-level Trojan horse backdoors(eg.
BO2K, Netcat) since the latter run as separate
programs which are easily detectable
¨a more insidious form of Trojan horse backdoor than application-level counterparts since existing critical system components are replaced to let attacker have backdoor access and hide
¨