1. Rootkit :
Rootkit is a set of application, a type of malware that is designed to infect a target PC and allow an attacker to install a set of tools that grant him persistent remote access to the computer. The malware typically pretended itself as normal files that “hide in plain sight” so your antivirus software overlooks them. It enables administrator-level access to a computer or computer network. The motive is to steal the identity information from your computer, often to gain control of a system. It is difficult to detect and remove, requires the specialized tools to remove.
2. Trojan Horse :
Trojan Horse is also a type of malware which uses false and fake name for mislead users from its true intent and executing them. Trojan Horses generally install on the system as legitimate and useful software that can give unauthorized access and control of the system to the hackers. Back orifice, Rootkit and Beast Trojan are some of the common Trojan horse which is more harmful.
Difference between Rootkit and Trojan Horse :
|1.||Rootkit is set of malicious program that enables administrator-level access to a computer network.||Trojan Horse is a form of malware that capture some important information about a computer system or a computer network.|
|2.||The main objective of rootkit is to steal the identity information, often to gain control of a system.||The main objective of Trojan horse is to steal the information.|
|3.||Detecting and removing a rootkit is a complex process and typically requires the use of specialized tools.||Trojan horses are detected by the antivirus software.|
|4.||Rootkit is one of the type of malware.||Trojan Horse is one of the type of malware.|
|5.||It give unauthorized access and control of the system to the attacker.||It can give unauthorized access and control of the system to the hackers.|
|6.||It is more harmful.||It is less harmful as compared.|
|7.||TDSS, ZeroAccess, Alureon and Necurs are some of the common rootkit.||Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses.|
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.