Rootkit

March 5, 2018

You are here:
< Back

A set of tools used by an attacker after gaining root-level access to a host to conceal the attacker’s activities on the host and permit the attacker to maintain root-level access to the host through covert means.
SOURCE: CNSSI-4009