While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: Evade post-mortem analysis Frustrate attempts to reverse engineer your command&control modules Defeat live incident response Undermine the process of memory analysis Modify subsystem internals to feed misinformation to the outside Entrench your code in fortified regions of execution Design and implement covert channels Unearth new avenues of attack Offers exhaustive background material on the Intel platform and Windows InternalsCovers stratagems and tactics that have been used by botnets to harvest sensitive dataIncludes working proof-of-concept examples, implemented in the C programming languageHeavily annotated with references to original sources © 2013 | 784 pages
1138128667
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: Evade post-mortem analysis Frustrate attempts to reverse engineer your command&control modules Defeat live incident response Undermine the process of memory analysis Modify subsystem internals to feed misinformation to the outside Entrench your code in fortified regions of execution Design and implement covert channels Unearth new avenues of attack Offers exhaustive background material on the Intel platform and Windows InternalsCovers stratagems and tactics that have been used by botnets to harvest sensitive dataIncludes working proof-of-concept examples, implemented in the C programming languageHeavily annotated with references to original sources © 2013 | 784 pages
137.95
In Stock
 
5
1
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System
784
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System
784Related collections and offers
137.95
In Stock
Product Details
| ISBN-13: | 9781449696290 | 
|---|---|
| Publisher: | Jones & Bartlett Learning | 
| Publication date: | 03/16/2012 | 
| Sold by: | Barnes & Noble | 
| Format: | eBook | 
| Pages: | 784 | 
| File size: | 51 MB | 
| Note: | This product may take a few minutes to download. | 
About the Author
From the B&N Reads Blog