Home > Articles
Cracking the nutshell - Oct 2007
Journey to the Center of the Rustock.B Rootkit
- The strange case of Dr Rootkit and Mr Adware
in Corporate Espionage
in your programs and how they can help install Rootkits
Related Blackhat 2006 Presentations
We have collated a list of presentations from the top researchers
in the world who have made presentations at Blackhat Briefings at
Las Vegas, Amsterdam and Washington in 2006. Some very interesting
A very important article on how to prevent rootkit's from taking
hold of your system. Many thanks to Spanner for the info.
Dale Preston gives a straight forward explanation of Rootkit's
and how they are used to hide malware from unsuspecting computer
users. This is a nice and easy read for people without much knowledge
Read the whole article at dalepreston.com
Detection and Removal
Gizmo gives a nice plain explanation of rootkit's, what
they are, what they can do and how they do it. A great article for
beginners to start off with.
Read the whole article at pcsupportadvisor.com
More Beginners Articles...
Sony Related Articles
of Sony CD's Containing XCP Content Protection Technology
Sony have released a list of CD's containing the XCP Content
The list includes the CD Title, Artist, Item Number and UPC. Check
out the list and compare it to your Sony CD collection... you may
be in for a surprise.
Read the whole article at sonybmg.com
You Infected by Sony-BMG's Rootkit?
Sony-BMG were using copy protection called XCP on certain
music CD's. Software using stealth techniques was installed when
you used the CD on a PC. This article will help you determine whether
your PC is infected with the rogue software installed by Sony-BMG.
Read the whole article at eff.org
More Sony Rootkit Related Articles....
Proof Of Concept Articles
Implementing malware with virtual machines (PDF- 204KB)
This makes for an excellent read for anyone who is in any way interested
in Rootkits. This article details in depth Virtual Machine Based
Rootkit ( VMBR's). The articles details how a hacker could install
a Virtual Machine on your PC that boots up first. The Virtual machine
would host malicious files. The Virtual Machine would also Boot
Up your normal operating system so you wouldnt suspect anything
the full article
Data Stream Malware Stealth Technique - Jun 2006
Streams, are a concept that exists in a NTFS file system which represents
a property of a file. Within a stream, it is possible to hide information
of any size, where the existence of this information is not shown
in the file system. The only way to extract that information is
to know the stream's name.
the full article
Proof Of Concept Articles....
rootkit's of 2005, Part 1,2 and 3
Excellent article by James Butler and Sherri Sparks which
goes into a bit of detail on rootkit's and how they hook into the
kernel, the various stealth methods and ways to detect rootkit's
Read the whole article at securityfocus.com
and Recovering from Rootkit Attacks
Old but still very good. This article from 1996 by David
O'Brien details how Rootkit's were used as Network Sniffers on Linux
machines to get usernames and passwords sent across a Network.
Read the whole article at cs.wright.edu
Father on rootkit writing for fun, profit
The software developer behind a leading rootkit program
says he is motivated by necessity, curiosity and a desire to expose
weaknesses in the Windows operating system and security technology.
He also isn't too worried about how others might use his software,
according to an e-mail interview with IDG News Service.
Read the whole article at infoworld.com
Backdoors, Trojan Horses and Rootkit Tools in a Windows Environment
Some Hackers wont let you know that your site has been hacked. It
serves them to stay hidden from view and continue to use the backdoor
that they created for their own purpose. The use of Rootkit's by
hackers is one way they can stay hidden to any network admin. This
article details with examples how this is achieved.
Read the whole article at windowsecurity.com
More Misc Rootkit Articles.....