Naziv |
Install Rootkit |
---|---|
Sažetak | An adversary exploits a weakness in authentication to install malware that alters the functionality and information provide by targeted operating system API calls. Often referred to as rootkits, it is often used to hide the presence of programs, files, network connections, services, drivers, and other system components. |
Preduvjeti | no |
Rješenja | Prevent adversary access to privileged accounts necessary to install rootkits. |