Computer Forensics Challenge 3: Analyze a hacker rootkit
Here is a hacker rootkit.
Analyze the rootkit and figure out what does this rootkit do.
- how it installs the trojan horse programs
- what information do these trojan horse programs try to hide
- how it affects the victim kernel
- ... etc