Hacker Tools and their Signatures, Part Three: Rootkits

From: Alfred Huger (ahat_private)
Date: Wed Aug 15 2001 - 09:40:51 PDT

  • Next message: Dean Cunningham: "RE: Fwd: of offending."

    Hacker Tools and their Signatures, Part Three: Rootkits
    by Toby Miller
    
    --------------------------------------------------------------------------------
    
    This is the third installment of a series devoted to examining hacker
    tools and their signatures. In this installment we will be looking at some
    of the signatures related to the KOH rootkit. The purpose of this paper is
    to assist the reader in detecting the KOH rootkit. Through this process,
    it is hoped that the reader will also learn steps to take to defend
    against the installation of these types of rootkits.
    
    
    http://www.securityfocus.com/focus/ids/articles/rootkit.html
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Wed Aug 15 2001 - 13:25:33 PDT