Deploying a Rootkit
Last updated
Was this helpful?
Last updated
Was this helpful?
Now, we will deploy the rootkit we’ve created in the Windows target machine.
Back on the Kali machine running Kernel Pack, you’ll see that the target is connected and actively sending live information.
There are many commands available to run against the target machine. As shown in the video, one example is "Screenshot", but you can also gather system information, list drivers, list processes, inject DLLs, and more.
The disconnection must be performed from the host machine (Kali). If not, the rootkit will maintain persistence on the target system.