logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System 1st Edition by Bill Blunden ISBN 1598220616 9781598220612

  • SKU: EBN-1408008
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.5

23 reviews
Instant download (eBook) The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System after payment.
Authors:Bill Blunden
Pages:937 pages.
Year:2009
Editon:1
Publisher:Jones & Bartlett Publishers
Language:english
File Size:81.33 MB
Format:pdf
ISBNS:9781598220612, 1598220616
Categories: Ebooks

Product desciption

(Ebook) The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System 1st Edition by Bill Blunden ISBN 1598220616 9781598220612

(Ebook) The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System 1st Edition by Bill Blunden - Ebook PDF Instant Download/Delivery: 1598220616, 9781598220612
Full download (Ebook) The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System 1st Edition after payment

Product details:

ISBN 10: 1598220616 
ISBN 13: 9781598220612
Author: Bill Blunden

A guide to rootkit technology covers such topics as using kernal debugger, modifying privilege levels on Windows Vista, establishing covert network channels, and using detour patches.

(Ebook) The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System 1st Table of contents:

Part I: Foundational Concepts

  • Chapter 1: Operating System Internals Primer

    • Kernel Mode vs. User Mode

    • Memory Management (Virtual Memory, Paging)

    • Process and Thread Management

    • System Calls (Syscalls)

    • Interrupts and Exception Handling

    • Filesystems and I/O Operations

    • Kernel Objects and Data Structures

  • Chapter 2: Malware Fundamentals

    • Types of Malware (Viruses, Worms, Trojans, Spyware, Adware, Rootkits)

    • Basic Malware Techniques (Persistence, Obfuscation, Anti-Analysis)

    • Introduction to Assembly Language (x86/x64)

    • Disassembly and Debugging Tools

Part II: User-Mode Rootkits

  • Chapter 3: User-Mode Hooking Techniques

    • API Hooking (DLL Injection, Detours, Trampolines)

    • IAT (Import Address Table) Hooking

    • EAT (Export Address Table) Hooking

    • Inline Hooking (Code Patching)

    • Case Studies: Real-world User-Mode Rootkits

  • Chapter 4: Process Hiding and Manipulation

    • Injecting Code into Other Processes

    • Process Suspension and Resumption

    • Process Hollowing and Doppelganging

    • Hiding Processes from Task Manager and Other Tools

  • Chapter 5: File and Registry Hiding in User Mode

    • Hooking File System APIs (e.g., NtQueryDirectoryFile)

    • Manipulating Registry Access Functions

    • Techniques for Hiding Files and Registry Keys

Part III: Kernel-Mode Rootkits

  • Chapter 6: Introduction to Kernel-Mode Development

    • Kernel Development Environment Setup (Windows Driver Kit)

    • Driver Structure and Loading

    • Debugging Kernel-Mode Code

    • Ring 0 vs. Ring 3 Revisited

  • Chapter 7: Kernel-Mode Hooking

    • SSDT (System Service Descriptor Table) Hooking

    • IRP (I/O Request Packet) Hooking

    • Object Hooking (Object Callbacks)

    • Interrupt Descriptor Table (IDT) and Global Descriptor Table (GDT) Hooking

    • Direct Kernel Object Manipulation (DKOM)

  • Chapter 8: Hiding Processes and Files in the Kernel

    • Unlinking EPROCESS Blocks

    • Manipulating Callback Routines

    • Directly Modifying File System Structures

    • Stealth Techniques for Kernel Drivers

  • Chapter 9: Network Traffic Interception and Manipulation

    • Hooking Network Drivers (NDIS)

    • Packet Sniffing and Injection in Kernel Mode

    • Firewall Evasion Techniques

  • Chapter 10: Advanced Persistence and Evasion

    • Bootkits and BIOS/UEFI Rootkits (Introduction)

    • Virtual Machine-Based Rootkits (VMBRs)

    • Anti-Forensics Techniques

    • Rootkit Detection Evasion (Against Signature, Heuristic, and Behavioral Analysis)

Part IV: Detection and Defense

  • Chapter 11: Rootkit Detection Techniques

    • Signature-Based Detection

    • Integrity Checking and Hash Comparisons

    • Behavioral Analysis (Monitoring APIs, System Calls)

    • Cross-View/Cross-Verification Analysis

    • Memory Forensics for Rootkit Detection

    • Hardware-Assisted Virtualization for Detection

  • Chapter 12: Rootkit Removal and Prevention Strategies

    • Live vs. Offline Analysis

    • Specialized Rootkit Removers

    • Operating System Security Features (PatchGuard, Driver Signing)

    • Secure Boot and Trusted Platform Modules (TPMs)

    • Best Practices for System Hardening

People also search for (Ebook) The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System 1st:

the rootkit arsenal 2nd edition pdf
    
the rootkit arsenal 3rd edition
    
the rootkit arsenal 2nd edition
    
a rootkit
    
rootkit arsenal amazon
    
the rootkit arsenal pdf

 

 

 

 

 

Tags: Bill Blunden, Rootkit, Arsenal

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products