Chapter 11: Installation Considerations


Overview

This chapter will help answer many of the questions you will face when designing the installation mechanism for your rootkit. Some of the installation techniques are industry standards, used by a large percentage of commercial software manufacturers, while other techniques in this chapter can only be found in rootkit literature.

This chapter includes the following:

  • Intended installation

  • Unintended installation

  • Privilege escalation

  • Installation persistence

  • Using ZwSetSystemInformation

  • Registry settings

  • Initialization files

  • Installation through exploitation

  • Installation cleanup

  • Testing your installation




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net