
Hooking or Monitoring System calls in linux using ftrace
By
A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. In this part we will analysis rootkits hiding and exploiting techniques.