< Day Day Up > |
In order to understand how rootkits can be used to subvert an OS kernel, it helps to know which functions the kernel handles. Table 2-1 describes each major functional component of the kernel.
Now that we have an idea of the functions of the kernel, we will discuss how a rootkit might be designed to modify the kernel. |
< Day Day Up > |