Felix Olowononi

49%
Flag icon
Rootkits have system-level or kernel access and can modify system files and system access. Rootkits hide their running processes to avoid detection with hooking techniques. Tools that can inspect RAM can discover these hidden hooked processes.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview