Question

Write a short one page paper about Gaining Access and maintain access rootkit or spy kit...

Write a short one page paper about Gaining Access and maintain access rootkit or spy kit and clear the log of victim machine after gaining access.

Homework Answers

Answer #1

This is one type of dangerous security attack to hack into other systems remotely via rootkits and spy kits. These are the malicious coded softwares that are used by cybercriminals to get into other systems remotely and they make use of the system that they hacked. This type of attack has some steps to do so.

First cyber criminals gather information regarding the victim and try to find the vulnerability in his system. Then they will exploit that loophole and before patching that loophole they will install a rootkit or spy kit there in the victim's PC. Later on, even though the vulnerability was patched this backdoor stay in the system and work according to the will of cyber-criminal.

So in this Gaining Access to the system is one step where the attacker or hacker gets root access of the victim's system ( root access means the privileged mode of access). In this mode, the hacker can do anything using the victim's PC.

So here the next step is maintaining access. Previously attacker gained access to the PC but the victim may disconnect with the network or he may also shut down his PC too, now the hacker tries to make that backdoor works again after the PC is active.

He designed that rootkit in such a way that it can maintain access with that PC whenever its requirement met ( like turning PC on and connecting to the internet ). Then after doing what exactly he wants to do with that PC the attacker will get execute the last step i.e clearing logs of victim machine after gaining access to et rid of being caught by police or to be safe from risk.

Clearing logs is nothing but deleting all the history of malicious works he did on that PC remotely. So this is the proper planned execution of unethical hackers or cyber-criminals to make use of others PCs remotely. Gaining Access, Maintaining Access later on clearing logs.

***Any doubt please feel free to comment***

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Write a one page paper about the personality code "ESFJ" Can you see the importance of...
Write a one page paper about the personality code "ESFJ" Can you see the importance of knowing your personality when choosing careers? Please provide examples in your reflection paper. If you Google ESFJ, you can read about the personality code.
I need one page reaction paper about the anti vaccine issues
I need one page reaction paper about the anti vaccine issues
This assignment asks you to write a paper (1 page) about transactional leadership, more specific the...
This assignment asks you to write a paper (1 page) about transactional leadership, more specific the CONTINGENT REWARD. Please support your ideas
Write an informal paper that is exactly 3 pages long not counting the reference page or...
Write an informal paper that is exactly 3 pages long not counting the reference page or cover page. The paper should be on one of the following subjects: Access to Cable, Broadcast TV, Broad-band Internet, and cellular service in your home county or country. Impact of requiring Amazon to collect state sales taxes. Access to Cable, Broadcast TV, Broad-band Internet, and cellular service in your home county or country 10 years ago. What is net neutrality and how does it...
write a 2 page paper on your own words about " People coming before profits even...
write a 2 page paper on your own words about " People coming before profits even in a crisis". give a appropriate example.
Write a short paper about important applications of filters (electronics). (3to 5 pages).
Write a short paper about important applications of filters (electronics). (3to 5 pages).
Find an article that discusses attacks on Public Key encryption. Write a one to two-page paper...
Find an article that discusses attacks on Public Key encryption. Write a one to two-page paper on the topic
read Plato's Allegory of the Cave and write a one-page paper in which you explain, in...
read Plato's Allegory of the Cave and write a one-page paper in which you explain, in your own words, the allegory and indicate why it is important.
Write a ONE page paper on: Describe three techniques or procedures that managers can use to...
Write a ONE page paper on: Describe three techniques or procedures that managers can use to determine whether a goal is difficult. * Please name online source(s) if used. *
Write a ONE page paper on: Describe what transformational leadership is and explain how managers can...
Write a ONE page paper on: Describe what transformational leadership is and explain how managers can engage in it. * Please name online source(s) if used. *