A rootkit is a program that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
The intruder installs a rootkit on a computer using a user action, by exploiting a known vulnerability or cracking a password.
The rootkit installs a backdoor giving the hacker full control of the computer. It hides their files, registry keys, process names, and network connections from your eyes.