This book details and implements all the major components of modern rootkits and provides the ancillary programs required to load, unload, configure, test, and control those rootkits. In addition, the book begins with a chapter on building a rootkit toolkit and ends with chapters on detecting and preventing rootkits. This overall coverage is designed to provide the reader with a complete understanding of rootkit capabilities, the technology used by rootkits, the tools used to develop and test rootkits, and the detection and prevention methods used to impede the distribution of rootkits.