Chapter 12: Ghost Tracker


Overview

This chapter focuses on the design and implementation of the rootkit remote controller. Though the design of the rootkit can be expected to follow established guidelines, the design of a rootkit controller can vary widely depending upon the intended use. For this reason, portions of this chapter are broader than the example provided, which had to be implemented for a specific purpose.

This chapter includes the following:

  • The controller

  • The interface medium

  • The interface

  • The Summary view

  • Control categories

  • The connection

  • Tamper detection

  • An example




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net