计算机书籍控

Rootkit:系统灰色地带的潜伏者(英文)

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: -Evade post-mortem analysis -Frustrate attempts to reverse engineer your command & control modules -Defeat live incident response -Undermine the process of memory analysis -Modify subsystem internals to feed misinformation to the outside -Entrench your code in fortified regions of execution -Design and implement covert channels -Unearth new avenues of attack

目录


Part I  Foundation
Chapter 1  Empty Cup Mind
Chapter 2  Anti-Forensics Overview
Chapter 3  Hardware Briefing
Chapter 4  System Software Briefing
Chapter 5  Tools of the Trade
Chapter 6  Life in Kernel Space
Part II  Post-Mortem
Chapter 7  Defeating Disk Analysis
Chapter 8  Foiling Executable Analysis
Part III  Live Response
Chapter 9  Defeating Live Response
Chapter 10  Shellcode
Chapter 11  Modifying Call Tables
Chapter 12  Modifying Code
Chapter 13  Modifying Objects Kernel
Chapter 14  Covert Channels
Chapter 15  Going Out-of-Band
Part IV  Summation
Chapter 16  The Tao of Rootkits

书籍下载

尊重版权,请购买正版书籍

正版书籍

Rootkit:系统灰色地带的潜伏者(英文)