Other Tools to Consider


This might be a bit premature, but rootkit development also depends upon rootkit detection and prevention tools. Once you have a thorough understanding of these tools, you can design and develop rootkits that defeat these detection and prevention systems. Of course, the developers of these detection and prevention systems do not consider them to be tools at all; they are more likely considered to be “security applications,” but to the rootkit developer, they are simply tools. See Chapter 13, “Detecting Rootkits,” and Chapter 14, “Preventing Rootkits,” for these tools.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net