eBooks-it.org Logo
eBooks-IT.org Inner Image

Designing BSD Rootkits

An Introduction to Kernel Hacking

Designing BSD Rootkits Image

Book Details:

Publisher:No Starch Press
Series: No Starch
Author:Joseph Kong
Edition:1
ISBN-10:1593271425
ISBN-13:9781593271428
Pages:144
Published:Apr 10 2007
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:8.38 MB

Book Description:

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application. Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself!

Download Link:

Related Books:

Rootkits

Subverting the Windows Kernel
Rootkits Image
"It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc....

Rootkits for Dummies

Rootkits for Dummies Image
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected.Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control.Accompanying the book is a value-packed companion CD offering a unique suite of too...

Professional Rootkits

Professional Rootkits Image
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution.This book provides the detailed, step-by-step instructions and examples required to produce full-featured, robust rootkits. Presented in modular sections, source code from each chapter can be used separately or together to produce highlyspecific functionality. In addition, Vieler details the loading, configuration, and control te...



2007 - 2021 © eBooks-IT.org