1.2 Distilling a More Precise Definition
book series from Microsoft and also to the Sysintcrnals tool suite. According
to Mark, a rootkit is
"Software that hides itself or other ob jects, such as files, processes, and
Registry keys, from view of standard diagnostic, administrative, and
security software,
Greg Hoglund, the godfather of Windows rootkits, offered the following
definition in the book that he co-authored with Jamie Butler:
"A rootkit is a set of programs and code that allows a permanent or
consistent, undetectable presence on a computer. "
Greg's book first went to press in 2005, and he has since modified his defini¬
tion:
"A rootkit is a tool that is designed to hide itself and other processes,
data, and/or activity on a system"
In the blog entry that introduces this update definition, Greg adds:'�
"Did you happen to notice my definition doesn't bring into account
intent or the word 'intruder'?"
Note: As I mentioned in this book's preface, I'm assuming the vantage point of a Black
Hat. Hence, the context in which I use the term "rootkit" is skewed in a manner that
emphasizes attack and intrusion.
In practice, rootkits are typically used to provide three services:
■ Concealment.
■ Command and control (C2).
■ Surveillance.
Without a doubt, there are packages that offer one or more of these features
that aren't rootkits. Remote administration tools like OpenSSH, GoToMyPC
by Citrix, and Windows Remote Desktop are well-known standard tools.
There's also a wide variety of spyware packages that enable monitoring and
13. Mark Russinovich, Rootkits in Commercial Software, January 15, 2006, hltp://blogs.technet,
coni/markrLi.ssinovich/archive/2006/0 l/l5/rootkits-in-commercial-software.aspx.
14. Greg Hoglund and Jamie Butler, Rootkits: Subverting the Windows Kernel, Addison-Wesley,
2005, ISBN-13: 978-0321294319.
15. http://rootkit.com/blog.php?newsid=440&uscr=hoglund.
Parti I 11