mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-24 18:33:08 +08:00
Final changes and final PDF
This commit is contained in:
@@ -36,7 +36,7 @@ after a system reboot, without further user interaction or the need of a
|
||||
new compromise. The techniques used for achieving both of these
|
||||
capabilities depend on the type of rootkit developed. One of the most
|
||||
commmon classifications is based on the level of privileges on which the
|
||||
rootkit operates in the system:
|
||||
rootkit operates in the system \cite{rootkit_ptsecurity}:
|
||||
\begin{itemize}
|
||||
\item \textbf{User-mode} rootkits run at the same level of privilege as
|
||||
common user applications. They usually work by hijacking legitimate
|
||||
|
||||
Reference in New Issue
Block a user