Professional Rootkits

Professional Rootkits
Author :
Publisher : John Wiley & Sons
Total Pages : 358
Release :
ISBN-10 : 9780470149546
ISBN-13 : 047014954X
Rating : 4/5 (54X Downloads)

Book Synopsis Professional Rootkits by : Ric Vieler

Download or read book Professional Rootkits written by Ric Vieler and published by John Wiley & Sons. This book was released on 2007-05-23 with total page 358 pages. Available in PDF, EPUB and Kindle. Book excerpt: Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution. This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control techniques used to deploy rootkits. All ancillary software is fully detailed with supporting source code and links to the compilers, utilities, and scripts necessary to build and run every example provided. What you will learn from this book Complete coverage of all major rootkit technologies: kernel hooks, process injection, I/O filtering, I/O control, memory management, process synchronization, TDI communication, network filtering, email filtering, key logging, process hiding, device driver hiding, registry key hiding, directory hiding and more Complete coverage of the compilers, kits, utilities, and tools required to develop robust rootkits Techniques for protecting your system by detecting a rootkit before it's installed Ways to create modular, commercial grade software Who this book is for This book is for anyone who is involved in software development or computer security. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.


Professional Rootkits Related Books

Professional Rootkits
Language: en
Pages: 358
Authors: Ric Vieler
Categories: Computers
Type: BOOK - Published: 2007-05-23 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your networ
Rootkits
Language: en
Pages: 354
Authors: Greg Hoglund
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Rootkits and Bootkits
Language: en
Pages: 504
Authors: Alex Matrosov
Categories: Computers
Type: BOOK - Published: 2019-05-07 - Publisher: No Starch Press

DOWNLOAD EBOOK

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. W
Managed Code Rootkits
Language: en
Pages: 336
Authors: Erez Metula
Categories: Computers
Type: BOOK - Published: 2010-11-25 - Publisher: Elsevier

DOWNLOAD EBOOK

Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independ
Malware, Rootkits & Botnets A Beginner's Guide
Language: en
Pages: 432
Authors: Christopher C. Elisan
Categories: Computers
Type: BOOK - Published: 2012-09-05 - Publisher: McGraw Hill Professional

DOWNLOAD EBOOK

Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive