Hackers tools


A rootkit is a hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on the network, mask the fact that the system is compromised, and much more.
Rootkits is a classic example of Trojan horse software. Rootkit is available for a wide range of operating systems.Generally, Windows rootkits have the ability to hide:
  1. Processes,
  2. Files (.txt, .exe, .jpg, .sys, etc.) and folders,
  3. Registry entries,
  4. Services and drivers,
  5. Ports and connections,
  6. Any other code or software included or added in the package like backdoors, key loggers, sniffers, virus, and so on. 
Rootkits can be used legally or not, with or without a physical access to a machine. For:
  1. Personal research, education, for anti-rootkits development,
  2. Hiding files from others users,
  3. Increasing the stealth abilities of a spy software (a basic keylogger hidden by a rootkit can be more stealth than some “invisible keyloggers”),
  4. Advanced criminal attackers for criminal goals (like cyber extortions), and by
  5. People involved in wars and piracy (hiding files on servers),
  6. Private and government security agencies for spying firms for patent, sensitive, and promising technologies or potential terrorists and activists

Hackers tools (Rootkits) Examples :
FU :
The FU rootkit can hide processes, elevate process privileges, and fake out the Windows Event Viewer so that forensics is impossible, and even hide device drivers. 

Hacker Defender :
Hacker Defender is the rootkit, which is the most widely used. Hacker Defender or HxDef is the favorite rootkit of Script-Kiddies for many reasons:
  • It is “light” (199k for the zip, 315k for the entire package);
  • An exhaustive package which already integrates a backdoor;
  • Highly configurable (INI file);
  • Ready to use with a simple command line;
  • Does not require advanced skill; and 
  • Can be installed remotely. 


Hackers tools Hackers tools Reviewed by Unknown on 1:01 AM Rating: 5

No comments:

Forensicpedia.blogspot.com. Powered by Blogger.