An edition of Rootkit arsenal (2012)

Rootkit arsenal

escape and evasion in the dark corners of the system

2nd ed.
  • 4.00 ·
  • 1 Rating
  • 2 Want to read
  • 0 Currently reading
  • 1 Have read

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 4.00 ·
  • 1 Rating
  • 2 Want to read
  • 0 Currently reading
  • 1 Have read

Buy this book

Last edited by ImportBot
April 1, 2023 | History
An edition of Rootkit arsenal (2012)

Rootkit arsenal

escape and evasion in the dark corners of the system

2nd ed.
  • 4.00 ·
  • 1 Rating
  • 2 Want to read
  • 0 Currently reading
  • 1 Have read

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: Evade post-mortem analysis; Frustrate attempts to reverse engineer your command & control modules; Defeat live incident response; Undermine the process of memory analysis; Modify subsystem internals to feed misinformation to the outside; Entrench your code in fortified regions of execution; Design and implement covert channels; Unearth new avenues of attack. - Publisher.

Publish Date
Language
English
Pages
784

Buy this book

Previews available in: English

Edition Availability
Cover of: Rootkit arsenal
Rootkit arsenal: escape and evasion in the dark corners of the system
2012, Jones & Bartlett Learning
in English - 2nd ed.

Add another edition?

Book Details


Table of Contents

Foundation
Empty cup mind
Anti-forensics overview
Hardware briefing
System software briefing
Tools of the trade
Life in kernel space
Post-mortem
Defeating disk analysis
Foiling executable analysis
Live response
Defeating live response
Shellcode
Modifying call tables
Modifying code
Modifying objects kernel
Covert channels
Going out-of-band
Summation
The tao of rootkits
Epilogue.

Edition Notes

Includes index.

Published in
Burlington, Mass

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 B585 2012, QA76.9.A25 B585 2013, QA76.9.A25B585 2012

The Physical Object

Pagination
p. cm.
Number of pages
784

ID Numbers

Open Library
OL25121731M
Internet Archive
rootkitarsenales0002blun
ISBN 10
144962636X
ISBN 13
9781449626365
LCCN
2011045666
OCLC/WorldCat
808125878

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
April 1, 2023 Edited by ImportBot import existing book
December 13, 2022 Edited by MARC Bot import existing book
December 7, 2022 Edited by ImportBot import existing book
February 8, 2022 Edited by ImportBot import existing book
December 7, 2011 Created by LC Bot Imported from Library of Congress MARC record