Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Guides
Programming Guides & Questions
[Theory] Native Windows API (NTAPI)
Message
<blockquote data-quote="tim one" data-source="post: 572999" data-attributes="member: 25920"><p>Thanks I'll PM you for sure<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p><p></p><p>I am working on this big project about user-mode rootkits, which intercept and modify processes related to applications and overwriting memory.</p><p>Then about kernel-mode rootkits that operate at low-level of the operating system.</p><p>A kernel rootkit can take control of any function of the system directly to the more privileged level. This category of rootkit is much more dangerous and complex of the user-mode ones; they are difficult to detect and remove, however they are less common.</p><p></p><p>My project would consist in a very technical and deep analysis of these rootkits and the difficulty is to collect and analyze a lot of documentation, doing research and possibly trying not documented infection patterns and methods.</p></blockquote><p></p>
[QUOTE="tim one, post: 572999, member: 25920"] Thanks I'll PM you for sure:) I am working on this big project about user-mode rootkits, which intercept and modify processes related to applications and overwriting memory. Then about kernel-mode rootkits that operate at low-level of the operating system. A kernel rootkit can take control of any function of the system directly to the more privileged level. This category of rootkit is much more dangerous and complex of the user-mode ones; they are difficult to detect and remove, however they are less common. My project would consist in a very technical and deep analysis of these rootkits and the difficulty is to collect and analyze a lot of documentation, doing research and possibly trying not documented infection patterns and methods. [/QUOTE]
Insert quotes…
Verification
Post reply
Top