Location:
Search - rootkit
Search list
Description: Professional rootkit
Table of Contents
Professional Rootkits
Credits
Introduction
Chapter 1 - Tools
Chapter 2 - A Basic Rootkit
Chapter 3 - Kernel Hooks
Chapter 4 - User Hooks
Chapter 5 - I/O Processing
Chapter 6 - Communications
Chapter 7 - Filter Drivers
Chapter 8 - Key Logging
Chapter 9 - Concealment
Chapter 10 - E-mail Filtering
Chapter 11 - Installation Considerations
Chapter 12 - Ghost Tracker
Chapter 13 - Detecting Rootkits
Chapter 14 - Preventing Rootkits
Appendix A - Freeware
Index
-Table of Contents
Professional Rootkits
Credits
Introduction
Chapter 1- Tools
Chapter 2- A Basic Rootkit
Chapter 3- Kernel Hooks
Chapter 4- User Hooks
Chapter 5- I/O Processing
Chapter 6- Communications
Chapter 7- Filter Drivers
Chapter 8- Key Logging
Chapter 9- Concealment
Chapter 10- E-mail Filtering
Chapter 11- Installation Considerations
Chapter 12- Ghost Tracker
Chapter 13- Detecting Rootkits
Chapter 14- Preventing Rootkits
Appendix A- Freeware
Index
Platform: |
Size: 8218624 |
Author: Prochg |
Hits:
Description: Win32 Kernel Rootkits modify the behaviour of the system by Kernel Native API hooking. This technique is typically implemented by modifying the ServiceTable entries in the Service Descriptor Table (SDT). Such modification ensures that a replacement (hook) function installed by a rootkit is called prior to the original native API. The replacement function usually calls the original native API and modifies the output before returning the results to the user-space program. This technique allows kernel rootkits to hide files, processes, and to prevent process termination.
This proof-of-concept tool demonstrates the possibility of defeating such rootkits by removing Kernel Native APIs hooks and restoring the ServiceTable entries back to their original state.
Platform: |
Size: 8192 |
Author: Mimi |
Hits:
Description: 基于指令跳转分析的Windows RootKit动态检测技术-Jump instruction based on the analysis of dynamic Windows RootKit Detection Technology
Platform: |
Size: 2323456 |
Author: cq |
Hits:
Description: 来自看雪的RootKit的学习与研究专题的电子书。
Rootkit是什么?估计很多朋友并不明白,简单的说,Rootkit是一种特殊的恶意软件,它的功能是在安装目标上隐藏自身及指定的文件、进程和网络链接等信息,比较多见到的是Rootkit一般都和木马、后门等其他恶意程序结合使用。Rootkit通过加载特殊的驱动,修改系统内核,进而达到隐藏信息的目的。技术是双刃剑,我们研究它的目的在于,透过我们的研究,用这项技术来保护我们的系统,使我们的系统更加健壮,充分发挥这个技术的正面应用。-RootKit see snow from the study and research the topic e-books. Rootkit What is it? Estimate many of my friends do not understand, simply, Rootkit is a special kind of malicious software, and its function is to hide itself in the installation and specify the target file, processes and Web links and other information, see the more general Rootkit are, and Trojans, backdoor and other malicious programs used in combination. Rootkit by loading special drivers, modify the system kernel, thus achieving the purpose of hidden information. Technology is double-edged sword, and we study it aims, through our research, using this technology to protect our systems to make our system more robust, give full play to the positive application of this technology.
Platform: |
Size: 1954816 |
Author: vivi |
Hits:
Description: Windows Rootkit隐藏技术研究 hook钩子-Windows Rootkit
Platform: |
Size: 7168 |
Author: Windows |
Hits:
Description: 一本关于rootkit的书籍,很好,我就是从这本书入门的,希望大家喜欢.-rootkit book,rootkit book,
Platform: |
Size: 805888 |
Author: li xian |
Hits:
Description: 曾经非常强大的ROOTKIT源代码,现在很难找到了。-Was very powerful ROOTKIT source code, it is difficult to find.
Platform: |
Size: 197632 |
Author: net |
Hits:
Description: 利用Rootkit实现的鼠标的拦截记录工具,记录鼠标操作-Using the mouse to achieve the interception Rootkit recording tool, record mouse
Platform: |
Size: 7822336 |
Author: FengBingwen |
Hits:
Description: rootkit 内核安全编程-rootkit kernel security programming ````````````````````
Platform: |
Size: 20827136 |
Author: snr52 |
Hits:
Description: 驱动级的Rootkit工具,可以远程控制-Rootkit driver-level tool for remote control
Platform: |
Size: 262144 |
Author: long80226 |
Hits:
Description: tdss3 rootkit dumper
Platform: |
Size: 57344 |
Author: karlchen72 |
Hits:
Description: Collection of PDF - Windows Rootkits, Rootkit detection, Api Hooks, Code Obfuscation Et-Collection of PDF - Windows Rootkits, Rootkit detection, Api Hooks, Code Obfuscation Etcc..
Platform: |
Size: 7286784 |
Author: karnel32221 |
Hits:
Description: Rootkit检测方面的有关隐藏进程检测方面的技术文章-Rootkit detection process of detecting hidden aspects of the relevant technical articles
Platform: |
Size: 3501056 |
Author: 刘东 |
Hits:
Description: klog for rootkit studying
Platform: |
Size: 143360 |
Author: coco |
Hits:
Description: Welcome to Designing BSD Rootkits! This book will introduce you to the fundamentals of programming and developing kernelmode rootkits under the FreeBSD operating system.Through the “learn by example” method, I’ll detail the different techniques that a rootkit can employ so that you can learn what makes up rootkit code at its simplest level.
Platform: |
Size: 8473600 |
Author: Aoshi Hanate |
Hits:
Description: Windows+Rootkit隐藏技术与综合检测方法-Windows+ Rootkit techniques to hide and comprehensive testing methods
Platform: |
Size: 307200 |
Author: hjh |
Hits:
Description: BIOS Rootkit 及其检测技术的研究-BIOS RootkitBIOS RootkitBIOS RootkitBIOS Rootkit
Platform: |
Size: 1771520 |
Author: wandev |
Hits:
Description: 介绍里面rootkit的应用,是一个非常好的学习例子。-Introduced inside the application rootkit。It s a very good learning example
Platform: |
Size: 589824 |
Author: lxd |
Hits:
Description: 随着android手机的普及,针对android手机的攻击也逐渐增加,本论文着重研究了rootkit对android手机的攻击方式-With the popularity of android phone, android phone for attacks is also increasing, this paper focuses on study of a rootkit attack on the android phone
Platform: |
Size: 436224 |
Author: 张蛟 |
Hits:
Description: 用C语言实现的针对android手机进行攻击的实例,使采用的是rootkit技术-Implemented in C language, for instance attack android phone, so that uses rootkit technology
Platform: |
Size: 1024 |
Author: 张蛟 |
Hits:
«
1
2
...
4
5
6
7
8
910
11
12
13
14
...
20
»