Chapter 13: Detecting Rootkits


Overview

Up until now, the focus of this book has been the functional implementation of rootkit technology, but many of the design decisions that go into a rootkit are spawned from rootkit detection technology. This chapter introduces the current state of rootkit detection technology to provide the rootkit designer with a perspective of the constraints that impact implementation.

This chapter includes the following:

  • Detection methods

  • Detection software

  • What to do with a detected rootkit

  • Safe mode




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net