Once a target machine is infected, the attacker needs to ensure persistence (the resilience or survivability of his foot-hold in the network). Rootkits and bootkits are commonly installed on compromised machines for this purpose. A rootkit is malware that provides privileged (root-level) access to a computer. A bootkit is a kernel-mode variant of a rootkit, […]
Category: Uncategorized
What position are you applying for?
Information Security Analyst.