Novel Implementation of Hybrid Rootkit
Keywords:Hybrid rootkit, malware, stealth, security, Trojans, Amazon Web Services
Statistics show that although malware detection are detecting and preventing malware, they do not guarantee a 100% detection and/or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such
that it can distribute other malware, hide existing malware, steal info, hide itself, disable anti-malware software etc. all without the knowledge of the user. This paper will demonstrate that by implementing hybrid rootkits or any other type of malware, a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful while implementing anti-malware techniques.