Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Thank you Bleeping Computer


  • Please log in to reply
1 reply to this topic

#1 Techvisitor

Techvisitor

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:10:31 PM

Posted 26 June 2012 - 09:15 PM

So I just want to jump on here for the first time since I've registered to say that I'm very happy to say that Bleeping computers has been instrumental in helping me remove several types of fakeAV malware. I haven't been successfull at removing rootkits so I'm curious to learn more and haven't been able to find good recources or someone to teach me. Using Forums is a bit of a new concept to me and I don't spend much time with customizations... therefore. I'm clearly straight to the point and just want to streamline and learn what more about how rootkits work.

Thanks for your replies and for reading my post. :)

Techvisitor

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,914 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:31 AM

Posted 26 June 2012 - 09:33 PM

Hello and welcome..

Rootkits, backdoor Trojans, Botnets, and IRC Bots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Rootkits are used by Trojans to conceal its presence (hide from view) in order to prevent detection of an attacker's software and make removal more difficult. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:

What danger is presented by rootkits?
Rootkits and how to combat them
r00tkit Analysis: What Is A Rootkit


If you need to discuss more start a General Chat topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users