Downote Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Downote Forum

Downloads Games, Movies, Music, Apps, Ebooks, Script, Template, etc
 
HomeHome  Latest imagesLatest images  SearchSearch  RegisterRegister  Log in  

 

 Rootkits Subverting the Windows Kernel

Go down 
AuthorMessage
Admin
Admin



Posts : 49206
Join date : 24/02/2012

Rootkits Subverting the Windows Kernel Empty
PostSubject: Rootkits Subverting the Windows Kernel   Rootkits Subverting the Windows Kernel EmptyTue Feb 16, 2016 7:25 am

Rootkits Subverting the Windows Kernel B7d8d74dac638859ed46fa298d75a944

Greg Hoglund, Jamie Butler, "Rootkits: Subverting the Windows Kernel"
2005 | pages: 447 | ISBN: 0321294319 | PDF | 2,5 mb

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection.
Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers.
After reading this book, readers will be able to
Understand the role of rootkits in remote command/control and software eavesdropping
Build kernel rootkits that can make processes, files, and directories invisible
Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects
Work with layered drivers to implement keyboard sniffers and file filters
Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks



Title: Rootkits Subverting the Windows Kernel
Size: 2.49 MB | Format: pdf
Download:
Code:

http://uploaded.net/file/lp96zz7o/wlzoc.Rootkits.Subverting.the.Windows.Kernel.pdf
https://userscloud.com/929r6ftlidfy/wlzoc.Rootkits.Subverting.the.Windows.Kernel.pdf
http://go4up.com/dl/ad4297bded25
http://rapidgator.net/file/cc4093b3b15962fd9de123d3bfea2bfe/wlzoc.Rootkits.Subverting.the.Windows.Kernel.pdf.html
Back to top Go down
http://downote.phyforum.com
 
Rootkits Subverting the Windows Kernel
Back to top 
Page 1 of 1
 Similar topics
-
» Designing BSD Rootkits
» Subverting Empire Deviance and Disorder in the British Colonial World
» Linux Kernel Development
» Linux Kernel Fundamentals
» Understanding the Linux Kernel

Permissions in this forum:You cannot reply to topics in this forum
Downote Forum :: Other Stuff-
Jump to: