As i am not very familiar with hacking tools and exploits used my cyber-criminals i need guidance on what tools could have been utilized to cause the following:
- Alter system tools to hide presence on network (rootkit),
- Create a backdoor Trojan as a means of accessing a network.
I know of a few such as armatage and metasploit but as they are pretty comprehensive and i haven't been able to find information that would indicate they could do these things.
Any direction would be brilliant!