Exploring Rootkits

Sep 26, 2025


Note: This is a theory/conceptual discussion — not a how-to. Don’t go do illegal stuff.

Googling “rootkit” often returns definitions like “gives remote access to the computer” and “malicious software code”— terms that apply to much malware.

So, how do we define exactly what a rootkit is?

What is a Rootkit

According to the book Rootkits: Subverting the Windows Kernel by Greg Hoglund and James Butler (2005), a rootkit is “a set of programs and code that allows a permanent and undetectable presence on a computer.”

Based on this definition, we should ask: Which programs and code do rootkits target?

This’ll require a bit of a dive into the hardware side of things, but don’t feel like Alice in Wonderland yet.

Feel free to look at:

There are also a few key terms I want you to consider as we read: persistence, stealth, and surveillance.

Types of Rootkits

We’ll focus on two in this article (for simplicity's sake): user-mode rootkits and kernel-mode rootkits.

Where Do Rootkits Operate

Rootkits are pretty scary because they can operate at different system levels.

Remember the Pyramid of Pain, created by security professional David J. Bianco in 2013.

Rootkits rank at, if not near, the very top of the Tactics, Techniques, and Procedures (TTPs) pyramid. As analysts, we must go beyond simply identifying obvious indicators, such as suspicious IP addresses or file hashes.

Instead, we need to develop the skillset to identify sophisticated (and varying methods) that attackers can use to install rootkits on a system. Taking a look at MITRE ATT&CK’s Rootkit, Technique T1014, reveals the various attacks that threat actor groups employ to achieve their goal of persistence.

I hate to cut this short, but I’ll continue discussing rootkits in the next blog post.


Create a free website with Framer, the website builder loved by startups, designers and agencies.