so i have been infected with root kits before on various comps and have become a bit paranoid about typing anything in nowdays. anyways, i realized that i really have no comprehension of how they really even function and was curious.
mainly, i'm trying to wrap my brain around how it works. so is it like, when a rootkit infected computer boots up... does a remote hacker have their own entire desktop alternate loaded operating system that comes up? or is it invisible cmd type lines they can input ? i'm just trying to grasp how it all really works. when a comp gets 'rooted' does that mean theres an entire different desktop running or is it much more simple than that? just tying to understand how all this works... i know they are typically used to install keyloggers and the like, but i can't really visually grasp what it looks like on the remote hackers side and was wondering.