Whether you want to learn how to develop a robust, full-featuredrootkit or you're looking for effective ways to prevent one frombeing installed on your network, this hands-on resource providesyou with the tools you'll need. Expert developer Ric Vieler walksyou through all of the capabilities of rootkits, the technologythey use, steps for developing and testing them, and the detectionmethods to impede their distribution.
This book provides the detailed, step-by-step instructions andexamples required to produce full-featured, robust rootkits.Presented in modular sections, source code from each chapter can beused separately or together to produce highlyspecificfunctionality. In addition, Vieler details the loading,configuration, and control techniques used to deploy rootkits. Allancillary software is fully detailed with supporting source codeand links to the compilers, utilities, and scripts necessary tobuild and run every example provided.
What you will learn from this book
Complete coverage of all major rootkit technologies: kernelhooks, process injection, I/O filtering, I/O control, memorymanagement, process synchronization, TDI communication, networkfiltering, email filtering, key logging, process hiding, devicedriver hiding, registry key hiding, directory hiding and more
Complete coverage of the compilers, kits, utilities, and toolsrequired to develop robust rootkits
Techniques for protecting your system by detecting a rootkitbefore it's installed
Ways to create modular, commercial grade software
Who this book is for
This book is for anyone who is involved in software developmentor computer security.
Wrox Professional guides are planned and written byworking programmers to meet the real-world needs of programmers,developers, and IT professionals. Focused and relevant, theyaddress the issues technology professionals face every day. Theyprovide examples, practical solutions, and expert education in newtechnologies, all designed to help programmers do a better job.