answersLogoWhite

0

Hi,

A rootkit is some kind of a Trojan that gives a hacker/cracker the access to your computer without you knowing it. It can come in a zip file or while Surfing online. Once the rootkit is installed on your computer, it sends a message to the cracker that he/she can now access the host machine. Then the cracker can use that machine as if it was his own.

So why do crackers do it? Well, for starters the challenge is there. Being able to see someone else's computer/ files gives them some weird satisfaction. But more importantly they do it to acquire personal information about the host. (addresses, phone numbers, birthdays, email addresses, bank information etc.) Most of the time they sell this info to other parties that are willing to pay a lot of bucks for it. (although now we give it for free via websites like facebook, if you know what i mean:) ) Another reason is that since they are using someone else's computer, it gives them the freedom to do things that otherwise they would get into trouble with their own machines. (visiting child-porn, hacking websites or chatting/ cybersex with minors). I know people that got into trouble like that.

A rootkit is hard to detect by using conventional antivirus software. Google "anti rootkit software" and you'll run into a bunch of software out there. Run this software regularly on your machine and you should be fine.

User Avatar

Wiki User

12y ago

Still curious? Ask our experts.

Chat with our AI personalities

TaigaTaiga
Every great hero faces trials, and you—yes, YOU—are no exception!
Chat with Taiga
ViviVivi
Your ride-or-die bestie who's seen you through every high and low.
Chat with Vivi
JudyJudy
Simplicity is my specialty.
Chat with Judy
More answers

A rootkit is a type of malicious software (malware) designed to gain unauthorized access to a computer system or network and maintain privileged, undetected access to that system. The primary purpose of a rootkit is to enable attackers to control the compromised system while avoiding detection by security mechanisms and antivirus software.

Rootkits typically operate at a low level of the operating system, often directly interacting with the kernel or other core components, which gives them extensive control over the system's behavior. Here are some of the main purposes and functionalities of rootkits:

1. Stealth: Rootkits are designed to hide their presence and activities on the compromised system. They may employ techniques such as concealing files, processes, registry entries, and network connections from system administrators and security tools.

2. Privilege Escalation: Rootkits often exploit vulnerabilities in the operating system or software to gain escalated privileges, allowing them to perform actions that would otherwise be restricted to system administrators or root users.

3. Backdoor Access: Rootkits can create backdoors or remote access points on the compromised system, enabling attackers to remotely control the system, steal sensitive information, install additional malware, or use the system for malicious purposes.

4. Persistence: Rootkits aim to maintain long-term access to the compromised system by installing themselves persistently, even after system reboots or security measures are taken. They may modify system boot processes, system files, or registry settings to ensure their continued presence and functionality.

5. Data Theft and Surveillance: Some rootkits are designed to monitor user activities, capture sensitive information such as login credentials, banking details, or personal data, and send this information to remote servers controlled by attackers.

6. Distributed Denial of Service (DDoS) Attacks: Rootkits can be used as part of botnets—networks of compromised computers—to launch DDoS attacks against targeted websites, servers, or networks, causing disruption or downtime.

Overall, the purpose of a rootkit is to facilitate unauthorized access, control, and manipulation of computer systems for malicious intent. Detecting and removing rootkits can be challenging due to their sophisticated evasion techniques and deep integration into the compromised system. Regular security measures such as antivirus software, intrusion detection systems, and system hardening practices are essential for protecting against rootkit attacks.

User Avatar

Add your answer:

Earn +20 pts
Q: What is the purpose of rootkit?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What programme would you use to gain administrative rights to someones computer?

bot executive android rootkit worm


What is a rootkit virus?

It is a virus that stops your computer at startup. They are very effective because you cant turn on your computer to get rid of it.


What is a backdoor and rootkit virus?

A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for such holes is not always sinister


What should be found in the best internet security software?

The best internet security software should consist of these qualities: Protection for the user, Antivirus capabilities, Firewall, Rootkit capabilities, and it should be able to detect trojans.


What is Rootkits?

Hi, A rootkit is some kind of a Trojan that gives a hacker/cracker the access to your computer without you knowing it. It can come in a zip file or while surfing online. Once the rootkit is installed on your computer, it sends a message to the cracker that he/she can now access the host machine. Then the cracker can use that machine as if it was his own. So why do crackers do it? Well, for starters the challenge is there. Being able to see someone else's computer/ files gives them some weird satisfaction. But more importantly they do it to acquire personal information about the host. (addresses, phone numbers, birthdays, email addresses, bank information etc.) Most of the time they sell this info to other parties that are willing to pay a lot of bucks for it. (although now we give it for free via websites like facebook, if you know what i mean:) ) Another reason is that since they are using someone else's computer, it gives them the freedom to do things that otherwise they would get into trouble with their own machines. (visiting child-porn, hacking websites or chatting/ cybersex with minors). I know people that got into trouble like that. A rootkit is hard to detect by using conventional antivirus software. Google "anti rootkit software" and you'll run into a bunch of software out there. Run this software regularly on your machine and you should be fine.