Summary


The rootkit controller developed for this chapter is primarily a learning tool, but the underlying design and structure can be applied to a wide range of remote controller designs. Though the requirements for your remote controller are sure to differ from the example presented, a few commonalities exist:

  • A main application that spawns a listening thread

  • A listening thread that spawns controller threads

  • Some form of overall status

  • Connection-specific controls

This concludes the coding portion of this book. The remaining chapters cover the more theoretical subjects of rootkit detection and rootkit prevention.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net