Rootkits Part 2

Corey explains inline function hooking, what kinds of Windows functions are susceptible to hooking, and how rootkits use hooking for backdoor access to your network.

You Can Learn More About the WatchGuards’ Product Line By Going to

The original article/video can be found at Rootkits Part 2

About the Author: Shannon Lewis

Leave a Reply Cancel reply