Exploit Pack - Documentation
  • Exploit Pack
    • Installation guide
    • License Activation
    • First steps
    • Running the network mapper
    • AutoPwn
    • UTF-8 Locator
    • Notepad
    • Reverse shell - One-liners
    • Hex Editor
    • GDB Connector
    • Log your actions
    • Exploits customization
    • Add a Proxy to Exploit Pack
    • Using Reverse Shells
    • XSS Agent - Tunnel
    • Advanced DLL Injections
    • VBS/PS Agent - Remote Access
    • VBS Agent Wizard
    • Exploit Development I
    • Exploit Development II
    • Exploit Development III
  • Control Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Control Pack
    • Launch your first agent
    • Control Pack agent's code
    • Agent connection
    • Java Agent
    • Browser Agent
    • VBS Agent
    • .NET Profiler DLL Agent
    • How to use the DLL + UnHooker Agent
    • .NET shell
    • Python Shell
  • Kernel Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Kernel Pack
    • Generating a new Rootkit
    • Deploying a Rootkit
    • Process hiding
    • Other features
Powered by GitBook
On this page

Was this helpful?

  1. Kernel Pack

Deploying a Rootkit

PreviousGenerating a new RootkitNextProcess hiding

Last updated 4 days ago

Was this helpful?

Now, we will deploy the rootkit we’ve created in the Windows target machine.

Back on the Kali machine running Kernel Pack, you’ll see that the target is connected and actively sending live information.

There are many commands available to run against the target machine. As shown in the video, one example is "Screenshot", but you can also gather system information, list drivers, list processes, inject DLLs, and more.

The disconnection must be performed from the host machine (Kali). If not, the rootkit will maintain persistence on the target system.