OP 17 October, 2024 - 05:08 PM
for educational purposes only
Environment:
Environment:
- CPU architecture
- Kernel/User mode (or mixed)
- Persistency
- Management interface
- Altering system (library) behavior
- Detection evasion
- System logs cleaning (filtering)
- Hiding of files and directories
- Hiding (tampering) of file contents
- Hiding of processes and process trees
- Hiding of network connections and activity
- Hiding of process accounting information (like CPU usage)
- Keylogger
- Backdoor/shell
- Gaining priveleges