1. 根工具包:
Rootkit 是一组应用程序,是一种恶意软件,旨在感染目标 PC 并允许攻击者安装一组工具,授予他对计算机的持久远程访问权限。恶意软件通常将自己伪装成“隐藏在视线中”的普通文件,因此您的防病毒软件会忽略它们。它支持对计算机或计算机网络的管理员级别访问。其动机是从您的计算机中窃取身份信息,通常是为了获得对系统的控制权。很难检测和去除,需要专门的工具去除。
2. 特洛伊木马:
特洛伊木马也是一种恶意软件,它使用假名和假名来误导用户并执行其真实意图。特洛伊木马通常作为合法且有用的软件安装在系统上,这些软件可以让黑客未经授权访问和控制系统。 Back orifice、Rootkit 和 Beast Trojan 是一些常见的木马,危害性更大。
Rootkit 和特洛伊木马的区别:
S.No. | ROOTKIT | TROJAN HORSE |
---|---|---|
1. | Rootkit is set of malicious program that enables administrator-level access to a computer network. | Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. |
2. | The main objective of rootkit is to steal the identity information, often to gain control of a system. | The main objective of Trojan horse is to steal the information. |
3. | Detecting and removing a rootkit is a complex process and typically requires the use of specialized tools. | Trojan horses are detected by the antivirus software. |
4. | Rootkit is one of the type of malware. | Trojan Horse is one of the type of malware. |
5. | It give unauthorized access and control of the system to the attacker. | It can give unauthorized access and control of the system to the hackers. |
6. | It is more harmful. | It is less harmful as compared. |
7. | TDSS, ZeroAccess, Alureon and Necurs are some of the common rootkit. | Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. |