
These are more of a quick fix category of anti rootkit tools. Few popular names are GMER, Rootkit Unhooker and RootRepeal. Since each tool deals with critical OS internals, any unintentional mistake could lead to an unstable system and loss of data. It is recommended to backup your data first or use it on a test machine. Almost all of these come with a usage warnings of ‘use at your own risk'. These anti rootkits are transparent enough to show a dissected view of the system. A novice computer user is unlikely to make any sense out of these tools’ output (nor are these tools recommended for them). These powerful tools aid experts with an overview of the infected system. Usage of these sophisticated tools requires considerable knowledge about the Windows OS’ internals. Windows anti rootkit software can be divided into two categories: Some methods used by anti rootkit software includes comparison of files, registry (to registry obtained from clean systems), kernel system call table (to its corresponding disk image), detection of use of alternate data streams, and kernel memory to known rootkit signatures.

Skillsets: The user’s skill level and experience with respect to an operating system is perhaps the most important factor while using an anti rootkit. Implementation specific: How effective are the anti rootkit’s techniques, with respect to the rapidly changing sophisticated root kits? Usage: How extensive is the anti rootkit software’s documentation? The usefulness of anti rootkit software is often driven by factors like:Įffectiveness: How regular are the anti rootkit’s updates?

This is usually achieved through techniques like identification of process hooks, examination of device drivers, digital signatures and network activity on the system under observation. A few such examples are the TDL rootkits, as well as those used by the Cutwail family.Īn anti rootkit is a tool designed to identify various threats like rogue and suspicious processes, hooks or modules, registry keys, modified files, and known/unknown rootkits. However, rootkits are sophisticated pieces of modules hidden deep inside the operating system (OS) along with legitimate software (like device drivers necessary for OS operation). This is usually achieved by booting Windows in Safe mode to clean registry keys and files responsible for the malware’s startup. Historically, the term originated when miscreants started to use modified binaries to maintain superuser access "root" on Unix systems.Ī malware payload can often be removed by stopping the responsible Windows exe/DLL from functioning. This file uses the registry to load itself during system boot, and then monitors for events like registry changes, new processes, registry of new file systems, and removable media like USB drives. A typical example of a kernel mode rootkit is a kernel device driver file, say rootkit.sys.
