Computer Forensics Challenge 3: Analyze a hacker rootkit


Here is a hacker rootkit.

Analyze the rootkit and figure out what does this rootkit do.

  1. how it installs the trojan horse programs
  2. what information do these trojan horse programs try to hide
  3. how it affects the victim kernel
  4. ... etc