#1
for educational purposes only


Hidden Content
You must register or login to view this content.



Environment:
  • CPU architecture
  • Kernel/User mode (or mixed)
Core capabilities:
  • Persistency
  • Management interface
  • Altering system (library) behavior
Stealth capabilities:
  • Detection evasion
  • System logs cleaning (filtering)
Hiding stuff capabilities:
  • Hiding of files and directories
  • Hiding (tampering) of file contents
  • Hiding of processes and process trees
  • Hiding of network connections and activity
  • Hiding of process accounting information (like CPU usage)
Additional functions:
  • Keylogger
  • Backdoor/shell
  • Gaining priveleges