DEPARTMENT OF COMPUTING

Rootkits

The best way to understand what a rootkit does is to play with one. As with all our labs, these are for educational purposes only. Any use of programs for illegitimate use either intentionally or unintentionally could result in failure of the course as well as legal action.

Make sure all this is done on a DISPOSABLE virtual machine. We will break things. The machine we compromised in the previous assignment would be ideal.

Virtualbox users could take a snapshot of your vm so it is easier to rollback after you are done.

Look at submission instructions below for what to turn in

Linux Rootkit 1

Linux Rootkit detection

TO submit

Linux Troubleshooting

Last Updated 12/30/2022