Results 1 to 2 of 2

Thread: Professional Rootkits

  1. #1


    **Hidden Content: To see this hidden content your post count must be 1 or greater.**




    TITLE : Professional Rootkits (Programmer to Programmer) (Paperback)
    AUTHOR : by Ric Vieler (Author)
    PUBLISHER : Wrox publisher
    ISBN : 0470101547
    EDITION : 1st
    PUB DATE : March 12, 2007
    LANGUAGE : English
    RLS DATE : 07/05/2007

    MAKER : BBL
    SUPPLIER : BBL
    PACKAGER : BBL
    FORMAT : CHM
    SIZE : 03 x 2.88 MB

    [ R e l e a s e N o t e s ]

    Whether you want to learn how to develop a robust, full-featured rootkit
    or you're looking for effective ways to prevent one from being installed
    on your network, this hands-on resource provides you with the tools
    you'll need. Expert developer Ric Vieler walks you through all of the
    capabilities of rootkits, the technology they use, steps for developing
    and testing them, and the detection methods to impede their
    distribution. This book provides the detailed, step-by-step instructions
    and examples required to produce full-featured, robust rootkits.
    Presented in modular sections, source code from each chapter can be used
    separately or together to produce highlyspecific functionality. In
    addition, Vieler details the loading, configuration, and control
    techniques used to deploy rootkits. All ancillary software is fully
    detailed with supporting source code and links to the compilers,
    utilities, and scripts necessary to build and run every example
    provided. What you will learn from this book:

    - Complete coverage of all major rootkit technologies: kernel hooks,
    process injection, I/O filtering, I/O control, memory management,
    process synchronization, TDI communication, network filtering, email
    filtering, key logging, process hiding, device driver hiding, registry
    key hiding, directory hiding and more
    - Complete coverage of the compilers, kits, utilities, and tools
    required to develop robust rootkits
    - Techniques for protecting your system by detecting a rootkit before
    it's installed
    - Ways to create modular, commercial grade software Who this book is
    for This book is for anyone who is involved in software development or
    computer security. Wrox Professional guides are planned and written by
    working programmers to meet the real-world needs of programmers,
    developers, and IT professionals. Focused and relevant, they address the
    issues technology professionals face every day. They provide examples,
    practical solutions, and expert education in new technologies, all
    designed to help programmers do a better job.

  2. #2
    Senior Member
    Join Date
    Oct 2006
    Location
    thailand
    Posts
    182


    เยี่ยมมากครับ กำลังอยากได้อยู่พอดี : )

    ขอบคุณครับ

Similar Threads

  1. .NET framework rootkits
    By Gen0TypE in forum Viral Tech
    Replies: 0
    Last Post: 13-04-2009, 12:20 AM
  2. Rootkits Utilities
    By SheLLniX in forum Security Tools
    Replies: 0
    Last Post: 18-11-2008, 05:29 PM
  3. Rootkits Analysis and Detection
    By akira in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 18-04-2008, 11:13 PM
  4. Rootkits for Dummies
    By akira in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 07-11-2007, 06:14 PM
  5. Designing BSD Rootkits
    By akira in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 07-11-2007, 06:02 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •