This document describes techniques for creating rootkits on Linux x86 systems. It discusses obtaining the system call table through the interrupt descriptor table and IDT register. It explains how to hook system calls by modifying the system call table entries or using inline assembly. The document also covers abusing debug registers to generate breakpoints and divert execution to custom handlers without modifying code. Overall, the document provides an overview of common rootkit techniques along with code examples for implementing hooks at the system call level and bypassing detection on Linux.