Don't let another machine become a zombie in the malware army

 

"A harrowing guide to where the bad guys hide, and how you can find them."
--Dan Kaminsky, Director of Penetration Testing, IOActive

"An amazing resource. It is timely, focused, and what we need to better understand and defend
against one of the greatest cyber threats we face."

--From the Foreword by Lance Spitzner, President of the Honeynet Project

  • Home
  • Buy
  • News
  • Authors
  • Contents
  • Reviews
  • Foreword
  • Resources
  • Errata

Table of Contents

  • Section I: Malware
  • Case Study 1
  • Chapter 1 - Method of Infection
  • Chapter 2 - Malware Functionality
  • Section II: Rootkits
  • Case Study 2
  • Chapter 3 - User Mode Rootkits
  • Chapter 4 - Kernel Mode Rootkits
  • Chapter 5 - Virtual Rootkits
  • Chapter 6 - The Future of Rootkits
  • Section III: Prevention Technologies
  • Case Study 3
  • Chapter 7 - Anti-Virus
  • Chapter 8 - Personal Firewalls/Pop Up Blockers
  • Chapter 9 - Host Based Intrusion Prevention
  • Chapter 10 - Anti-Rootkit Technology
  • Chapter 11 - General Security Practices
  • Appendix A - Building your own rootkit detector
  • Appendix B - About the Companion Web Site
  • Appendix C - Links and Resources

Contents


 
Download Chapter 10, Anti-Rootkit Technology (PDF)

© Copyright 2009 Michael A. Davis, Sean Bodmer, and Aaron LeMasters
Design by Free Web Design Community