This document discusses the history and evolution of rootkit technologies and their impact on digital forensics. It begins with defining rootkits as code used by attackers to surreptitiously execute and control systems while remaining undetected. The document then covers: (1) the origins and evolution of rootkits from modifying system binaries in the 1980s to more advanced techniques today, (2) the five classes of rootkits - application, library, kernel, firmware, and virtualized, and (3) how rootkits aim to hide themselves and impede forensic investigation, posing challenges for incident response.