Chaoscorpz
Technical User
Hey,
Has anyone ever heard of anyone trying to use a modified rootkit in a defensive manner?
I mean, with the level of access that a rootkit gives, an IT department could have a real low level control of workstations, before someone else implants a rootkit, or other malicious software.
Couldn't IT use a rootkit as part of our toolbox against those whom would use them or other malicious software against us? It could provide a level of logging that is extremely detailed.
Thanks,
IT
Has anyone ever heard of anyone trying to use a modified rootkit in a defensive manner?
I mean, with the level of access that a rootkit gives, an IT department could have a real low level control of workstations, before someone else implants a rootkit, or other malicious software.
Couldn't IT use a rootkit as part of our toolbox against those whom would use them or other malicious software against us? It could provide a level of logging that is extremely detailed.
Thanks,
IT