Rootkit: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
A set of tools used by an attacker after gaining root-level access to a host to conceal the attacker’s activities on the host and permit the attacker to maintain root-level access to the host through covert means.
Source: CNSSI 4009-2015 | Category: