Boot loader rootkit
replace boot loader with one controlled by the hacker Ring 0
Kernel level rootkit
attack the boot sectors kernel level of the OS replacing kernel code with back-door code. Ring 0
Application level rootkit
replace application files with trojan binaries. work within an to apps behavior, user rights and actions Ring 3
Library level rootkit
use system-level calls to hide their existence Ring 2
Ring 0
Kernel
Ring 1
Drivers
Ring 2
Libraries
Ring 3
Applications also User mode
Some Rootkits
Horsepill, grayfish, Sirefef, Azazel, Avatar, Necurs, ZeroAccess
Hypervisor rootkit
Modify the boot sequence of a host system to load a virtual machine as the host OS