Analysis of the KNARK rootkit
Source: Toby Miller - Posted by Ryan W. Maple   
Intrusion Detection Toby Miller has written an analysis of the KNARK rootkit: "The purpose of this paper is to identify signatures related to the KNARK rootkit. This paper does not show how to install the rootkit nor does it make any comparisons . . . Toby Miller has written an analysis of the KNARK rootkit: "The purpose of this paper is to identify signatures related to the KNARK rootkit. This paper does not show how to install the rootkit nor does it make any comparisons between this rootkit and other rootkits. This paper will attempt to educate the readers on the various signatures and problems related to this rootkit."

Read this full article at Toby Miller

Only registered users can write comments.
Please login or register.

Powered by AkoComment!