Posts Tagged ‘Rootkit’

Trend MicroTrend Micro Rootkit Buster Beta 5.0 – a free tool to detect rootkits

Trend Micro has announced a new version of the free product Rootkit Buster (Rootkit). C this easy-to-use, reliable and high-performance tool, you can detect rootkits – malicious applications carefully hide their tracks in the system. The main innovation presented in a new version of Rootkit Buster Beta 5.0, is the ability to detect potentially dangerous changes in the MBR (Master Boot Record).

Most existing tools for the detection of rootkits are bulky and not too fast programs targeted at advanced users and professionals. Product Trend Micro Rootkit Buster, available for 32-bit and 64-bit versions of Windows, sets itself apart from many of his “brothers.” The application’s interface is extremely simple and straightforward. All available functions are grouped in a single window. Tab «Log», as you might guess, provides access to the journal in which you can find a detailed report on the results of the audit. A tab «Scan» will configure the scan settings and select one of the key areas of the system (Files or Master Boot Records, Services and Kernel Code Patches) for verification. (more…)

RootkitRootKit term historically come from the world of Unix, where this term is a set of tools that a hacker installs them on a compromised computer after the initial access. This is usually hacking tools (sniffers, scanners) and Trojans, replacing the basic utilities Unix. RootKit allows a hacker to gain a foothold in the compromised system and conceal their activities.

In Windows, a RootKit is considered a program that penetrates into the system and hooks system functions, or shall replace the system libraries. Intercepting and modifying low-level API functions in the first place such a program can effectively hide its presence in the system, protecting it from detection by antivirus software and user. In addition, many RootKit can mask the presence of any system described in its configuration of processes, folders and files on a disk, registry keys. Many RootKit installed in your system drivers and services (which of course, are also “invisible”). (more…)

Computer VirusesBrute force attacks – the so-called attack by the “brute force”. Typically, users use simple passwords, such as “123”, “admin”, etc. These and enjoy computer hackers, who with the help of special calculates the Trojans to penetrate the network password brute – based embedded in the program password dictionary or generate a random sequence of characters.

Keyloggers – kind of Trojans, whose main function is to capture user input via the keyboard. The objects of the abduction are personal and network passwords, logins, credit card details and other personal information.

Backdoors – programs that provide input into the system or receiving the privileged function (mode), bypassing the existing system of authority. Often used to circumvent existing security system. Hatches do not infect files, but registers itself in the registry, thus modifying the registry keys. (more…)