Chapter 1 / Empty Cup Mind

Wondershare

Figure 1.2

Single-Stage Versus Multistage Droppers

The manner in which a rooticit is installed on a target can vary. Sometimes it's

installed as a payload that's delivered by an exploit. Within this payload will

be a special program called a dropper, which performs the actual installation

(see Figure 1.3).

Inpiii Byte Stream

Wondershare

Exploit

Figure 1.3

A dropper serves multiple purposes. For example, to help the rootkit make it

past gateway security scanning, the dropper can transform the rootkit (e.g.,

8 I Part I

:hl: