Day 14 - Cyber Snacks (Rootkits)

Day 14 - Cyber Snacks (Rootkits)

There many ways a hacker can attack a system, but “Rootkits” are one of the most prestigious. 

A rootkit gets at the “root” of your system, hence the name. The origins of the term comes from two separate concepts… 

  • Root - This is Unix terminology, which refers to admin-level access. Most average folks never use this operating system, so think of it as an alternative to Windows. “Root” access means the attacker has embedded themselves into the heart of your computer. 
  • Kit - The software the attacker created to run on your computer.

Now a rootkit can land on your machine in many different ways, but it's traditionally broken down into two pieces between “dropping” and “loading”. 

  • Dropping - This is the process of getting the rootkit onto your machine (e.g. dropping the rootkit), this can be done via malicious links, rich-text files (e.g. PDF), or piggybacking on trusted software 
  • Loading - Once the rootkit has been “dropped” the “loading” process kicks into action throwing its code deep into secret parts of your machine to hide. 

Rootkits come in a variety of flavors, but I won’t detail them all out here for you because this “Cyber Snack” is turning into more of a “meal” and less of a “snack”. Just know that the different levels of rootkit depend on the amount of access they have and where they’ve hidden (see below - red is bad and green is less bad)

No alt text provided for this image

Luckly, many newer operating systems have included this thing called “secure boot” that protects against some flavors of rootkits, so all hope is not lost. Also, successful rootkits are rare to see in the wild due to all the work it takes to create a quality one. 

Below are some historical examples of rootkits. 

No alt text provided for this image

The ever-changing landscape of cyber is fascinating, but what's more interesting is the sheer creativity and brilliance on both teams (red & blue).

要查看或添加评论,请登录

Dylan Davis的更多文章

  • Self Healing Code

    Self Healing Code

    Rather read with your ears? Then, I've got you covered. Check out this podcast where two LLMs talk through this blog…

  • TLDR: Lessons from 1 year of building with LLMs

    TLDR: Lessons from 1 year of building with LLMs

    This post is best consumed via video. I highly recommend taking the time to watch me chat about each one of these…

  • Three GPTs Walk into a Bar and Write an Exec Summary

    Three GPTs Walk into a Bar and Write an Exec Summary

    Don’t want to read? Then listen on Spotify or Apple podcast Today I want to share a process around three Custom GPTs…

    2 条评论
  • Life Lessons I Wish I Knew at 17: A Letter to My Niece

    Life Lessons I Wish I Knew at 17: A Letter to My Niece

    Dear Z, You're growing up quickly, and there are many important decisions ahead in the next few years. I realize I…

    7 条评论
  • OpenAI's 2024 Decline: A Value Prediction

    OpenAI's 2024 Decline: A Value Prediction

    This week's post is inspired by a prediction Chamath made in a recent All-in podcast. He predicts a dip in OpenAI's…

  • How do you keep up with AI?

    How do you keep up with AI?

    People often ask me, "How do you keep up with AI?" In this post, I aim to answer that. Here are the resources I…

    1 条评论
  • Disappearing data moats

    Disappearing data moats

    Are companies overvaluing their data moats in our new world of AI? A deeper exploration into synthetic data suggests…

  • Securing the New Era of AI-Driven Operating Systems: A Novice's Tale

    Securing the New Era of AI-Driven Operating Systems: A Novice's Tale

    Imagine a world where you’re interacting with a device (computer, phone, etc.) you no longer need to switch between…

  • GenAI's Shift: From Cyber Villain to LLM Protector

    GenAI's Shift: From Cyber Villain to LLM Protector

    Subscribe, so I can grace your inbox with my presence. ?? Don't want to read? Then listen to this post on Apple podcast…

  • Cyber Attacks (Session Hijacking)

    Cyber Attacks (Session Hijacking)

    The Attack Yesterday we explored cross-site scripting (XSS) and today this exact attack will lead us to our next…

社区洞察

其他会员也浏览了