Security Incidents mailing list archives

Hacker Tools and their Signatures, Part Three: Rootkits


From: Alfred Huger <ah () securityfocus com>
Date: Wed, 15 Aug 2001 10:40:51 -0600 (MDT)


Hacker Tools and their Signatures, Part Three: Rootkits
by Toby Miller

--------------------------------------------------------------------------------

This is the third installment of a series devoted to examining hacker
tools and their signatures. In this installment we will be looking at some
of the signatures related to the KOH rootkit. The purpose of this paper is
to assist the reader in detecting the KOH rootkit. Through this process,
it is hoped that the reader will also learn steps to take to defend
against the installation of these types of rootkits.


http://www.securityfocus.com/focus/ids/articles/rootkit.html


----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


Current thread: