Source Code


As you work through the examples in this book, you may choose either to type in all the code manually or to use the source code files that accompany the book. All of the source code used in this book is available for download at www.wrox.com. Once at the site, simply locate the book’s title (either by using the Search box or by using one of the title lists) and click the Download Code link on the book’s detail page to obtain all the source code for the book.

Tip 

Because many books have similar titles, you may find it easiest to search by ISBN; this book’s ISBN is 978-0-470-10154-4.

Once you download the code, just decompress it with your favorite compression tool. Alternately, you can go to the main Wrox code download page at www.wrox.com/dynamic/books/download.aspx to see the code available for this book and all other Wrox books.

Before you extract the Professional Rootkits archive, you will need to disable any anti-virus software running on your machine. Most (if not all) of the material covered in this book is considered harmful. As such, any good anti-virus software will do everything it can to prevent the transfer of these harmful files to your computer, so you will need to disable your anti-virus software or exclude your rootkit files from anti-virus protection whenever you are working with known rootkits. Of course, you will be writing never-before-seen rootkits soon, but until then, you will need to disable or reconfigure your anti-virus software.

If you don’t already have an archive tool to unzip the Wrox/Wiley download file, I recommend ZipCentral. This is absolutely free software offered without banners, spyware, or a 30-day trial. Just download zcsetup.exe from http://hemsidor.torget.se/users/z/zcentral/down.html and double-click it to install ZipCentral. Once installed, you can drag and drop archives onto the application or its desktop icon, and extract these archives to the directory of your choosing.

The extracted archive files are divided into individual chapters containing the source code, executables, and drivers mentioned in that chapter. If you intend to follow along without compiling the examples in these chapters, you can use the binaries provided for each chapter on any Windows 2000, XP, or 2003 operating system. If you intend to compile (and hopefully adapt) the source code provided, you will first need to build a rootkit toolkit, which is the topic of Chapter 1.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net