瑞星卡卡安全论坛综合娱乐区Rising茶馆 【电脑词汇】玩电脑不可不防的---Rootkit

123   1  /  3  页   跳转

【电脑词汇】玩电脑不可不防的---Rootkit

【电脑词汇】玩电脑不可不防的---Rootkit

呵呵,我有个要求,我先介绍什么是Rootkit,待有人翻译过来后,我再继续介绍它的功能、用途、种类及清除方式。
A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. These tools are intended to conceal running processes, files or system data, which helps an intruder maintain access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows.

The rootkit concept is the dominant controversial aspect of the 2005 Sony CD copy protection controversy, which has made the previously obscure concept of a rootkit much more widely known in the technology community, and to the general public.
最后编辑2006-09-20 22:07:22
分享到:
gototop
 

Rootkit是一套在获得电脑系统的使用权后, 经常被第三方使用(通常是入侵者)的软件工具.
这些工具故意隐藏运行程序, 文件或系统数据, 来帮助入侵者在使用者未知的情况下维持对系统的使用.
Rootkit是众所周知的为多种操作系统所存在的, 如Linux, Solaris和Microsoft Windows的版本.

Rootkit概念是2005年Sony CD正版保护辩论的主导争议的方面, 这使得以前一个rootkit的模糊概念被更加广泛地在科技界和一般公众了解.
gototop
 

引用:
【toshiakiw的贴子】Rootkit是一套在获得电脑系统的使用权后, 经常被第三方使用(通常是入侵者)的软件工具.
...
...........................


Well done! Thank you.
Now, the next part:

Functions of a rootkit

    A rootkit typically hides logins, processes, files, and logs and may include software to intercept data from terminals, network connections, and the keyboard. In many instances, rootkits are counted as trojan horses.

Uses of rootkits

    A rootkit is often used to hide utilities used to abuse a compromised system. These often include so called "backdoors" to help the attacker subsequently access the system more easily. For example, the rootkit may hide an application that spawns a shell when the attacker connects to a particular network port on the system. Kernel rootkits may include similar functionality. A backdoor may also allow processes started by a non-privileged user to execute functions normally reserved for the superuser. All sorts of other tools useful for abuse can be hidden using rootkits. This includes tools for further attacks against computer systems the compromised system communicates with such as sniffers and keyloggers. A common abuse is to use a compromised computer as a staging ground for further abuse. This is often done to make the abuse appear to originate from the compromised system or network instead of the attacker. Tools for this can include denial-of-service attack tools, tools to relay chat sessions, and e-mail spam attacks.

gototop
 

Thanks...

Study....
gototop
 

引用:
【endurer的贴子】Thanks...

Study....
...........................


Why not have a try?
gototop
 

感觉像是高手在过招
gototop
 

me too!
gototop
 

let me  have a  try
rootkit 是隐藏日志文件,进程,文件 ,包括从 终端窃取 软件,网络链接,和键盘的数据 的典型代表。rootkit 通常被认为是木马程序。
rootkit 通常被用做隐藏被入侵电脑被破坏的痕迹的角色。诸如之类的后门 就是帮助入侵者更加容易的获得电脑系统的使用权。例如,当入侵者连接到被入侵 的电脑系统后,rootkit 能够隐藏被壳包裹的应用程序!Kernel rootkits 可能包含相同的功能,
“后门”能够允许非授权用户执行 只有超级用户才能执行的程序。所有其他有用的破坏工具在rootkits 运行的条件下 都能够被隐藏。 这种工具使得入侵者更加有效的攻击连接在SNIFFERS和KEYLOGGERS的电脑。通常的用途是把被入侵的电脑作为一个平台,以便日后更有效的攻击。 这种工具也能使得入侵者变得更像是电脑使用者而不是入侵者。
这种工具包括 enial-of-service attack tools, tools to relay chat sessions, and e-mail spam attacks.
 
由于本人的电脑专业知识有限,所以错误在所难免,喜欢各大高手批评改正。谢谢
  贵在学习,不在对错
gototop
 

Well, thank you very much for taking great trouble to make us know something about how a rootkit,a kind of trojan horse, works.It is sure to help us to protect our computer from the attacks against which you have just warned us.

gototop
 

Now,I suppose,many members here might be interested in what the following is about.

Types of rootkitsBasic types
Rootkits come in two different flavours, kernel and application level kits. Kernel level rootkits add additional code and/or replace a portion of kernel code with modified code to help hide a backdoor on a computer system. This is often accomplished by adding new code to the kernel via a device driver or loadable module, such as Loadable Kernel Modules in Linux or device drivers in Microsoft Windows. Kernel rootkits commonly patch, hook, or replace system calls with versions that hide information about the attacker. Application level rootkits may replace regular application binaries with trojanized fakes, or they may modify the behavior of existing applications using hooks, patches, injected code, or other means. Kernel rootkits can be especially dangerous because they can be difficult to detect.

Examples
FU Rootkithttp
SuckIT
T0rn
Ambient's Rootkit (ARK)
Hacker Defender
...

***I just expect another member to help us out. Thank you first
gototop
 
123   1  /  3  页   跳转
页面顶部
Powered by Discuz!NT