Location:
Search - rootkits
Search list
Description: read the internal kernel data structures, in order to get reliable information about the system state (like list of all processes, including those \"hidden\" by rootkits, even by fu )
Platform: |
Size: 114604 |
Author: ketty |
Hits:
Description: 基于Windows内核层的Anti-Rootkits研究及其实现-Based on the Windows kernel level Anti-Rootkits Research and Implementation
Platform: |
Size: 990208 |
Author: shuai |
Hits:
Description: Shadow Walker is not a weaponized attack tool. Its functionality is
limited and it makes no effort to hide it s hook on the IDT or its page
fault handler code. It provides only a practical proof of concept
implementation of virtual memory subversion. By inverting the defensive
software implementation of non executalbe memory, we show that it is
possible to subvert the view of virtual memory relied upon by the
operating system and almost all security scanner applications. Due to its
exploitation of the TLB architecture, Shadow Walker is transparent and
exhibits an extremely light weight performance hit. Such characteristics
will no doubt make it an attractive solution for viruses, worms, and
spyware applications in addition to rootkits.
-Shadow Walker is not a weaponized attack tool. Its functionality is
limited and it makes no effort to hide it s hook on the IDT or its page
fault handler code. It provides only a practical proof of concept
implementation of virtual memory subversion. By inverting the defensive
software implementation of non executalbe memory, we show that it is
possible to subvert the view of virtual memory relied upon by the
operating system and almost all security scanner applications. Due to its
exploitation of the TLB architecture, Shadow Walker is transparent and
exhibits an extremely light weight performance hit. Such characteristics
will no doubt make it an attractive solution for viruses, worms, and
spyware applications in addition to rootkits.
Platform: |
Size: 24576 |
Author: kkakekikoku |
Hits:
Description: 好书,值得一看,是学习ROOTKIT 的好书-Good book ,it is worlth of you to read
Platform: |
Size: 1156096 |
Author: 邱和林 |
Hits:
Description: Inside windows rootkits,对学习rootkits有好处,可以作为深入学习rootkits的参考-Inside windows rootkits, good for learning rootkits, rootkits can be used as reference for in-depth study
Platform: |
Size: 691200 |
Author: 王谦 |
Hits:
Description: rootkits检测新方法,可以作为对rootkits的研究资料-new method for detecting rootkits can be used as research data on rootkits
Platform: |
Size: 936960 |
Author: 王谦 |
Hits:
Description: 基于内核的ROOTKITS的实现以及检测,学习安全的程序员可以参考-Kernel-based ROOTKITS the realization and detection, to study the safety of programmers can refer to the
Platform: |
Size: 1414144 |
Author: 王谦 |
Hits:
Description: Rootkits Subverting the Windows Kernel
Platform: |
Size: 1666048 |
Author: munizf |
Hits:
Description: Countering Persistent Kernel Rootkits Through
Systematic Hook Discovery
Platform: |
Size: 168960 |
Author: Oleg |
Hits:
Description: Countering Kernel Rootkits with Lightweight Hook
Protection
Platform: |
Size: 175104 |
Author: Oleg |
Hits:
Description: <ROOTKITS——Windows内核的安全防护>一书的配套代码。
非常值得rootkit爱好者们学习。-<ROOTKITS——Windows内核的安全防护> A complete code for the book. Rootkit lovers very worthwhile to learn.
Platform: |
Size: 514048 |
Author: zombie |
Hits:
Description: Professional Rootkits 书籍,一本很不错的讲解Rootkit的电子书-Professional Rootkits books, a very good e-books explain the Rootkit. .
Platform: |
Size: 8218624 |
Author: 王强 |
Hits:
Description: 《Rootkits——Windows内核的安全防护》一书的中文扫描版,是学习Rootkits的精典教材。-" Rootkits- Windows kernel security," a book of Chinese scan version of the classic textbook for learning Rootkits.
Platform: |
Size: 21720064 |
Author: 许静 |
Hits:
Description: Many people do not realize the real danger from rootkit technology. One reason for this probably
that publicly available rootkits for Windows OS are relatively easy to detect by conventional
methods (i.e. memory scanning based). However, we can imagine some techniques of rootkit
implementation, which will be undetectable by these methods, even if the rootkit concept will be
publicly available… In order to convince people that traditional rootkit detection is insufficient it
would be desirable to have a working rootkit implementing such sophisticated technology.-Many people do not realize the real danger from rootkit technology. One reason for this is probably
that publicly available rootkits for Windows OS are relatively easy to detect by conventional
methods (i.e. memory scanning based). However, we can imagine some techniques of rootkit
implementation, which will be undetectable by these methods, even if the rootkit concept will be
publicly available… In order to convince people that traditional rootkit detection is insufficient it
would be desirable to have a working rootkit implementing such sophisticated technology.
Platform: |
Size: 222208 |
Author: alice |
Hits:
Description: 《Professional Rootkits》的课本上的源代码和常用的调试工具-" Professional Rootkits" a textbook commonly used in the source code and debugging tools
Platform: |
Size: 18578432 |
Author: jackywu |
Hits:
Description: Rootkits技术在信息安全领域越来越受到重视,各种Anti-rootkits新技术不断出现。在各种Anti-root-
kits工具的围剿下,常规的Rootkits隐藏技术难以遁形。在系统分析和深入研究传统内核级Rootkits隐藏技术的基
础上,提出了一个集驱动模块整体移位、内核线程注入、IRP深度内联Hook 3种技术为一体的Rootkits隐藏技术体
系。-Rootkits technology in the field of information security more and more attention, all kinds of Anti-rootkits new technologies continue to emerge. In a variety of Anti-root-kits Tools of the siege, the conventional Rootkits hide the technology is difficult to hide. In traditional systems analysis and in-depth study of kernel-level Rootkits hiding technique is proposed based on a set of drive module as a whole shift, into the kernel thread, IRP depth inline Hook 3 kinds of technology as one of the Rootkits hide the technical system.
Platform: |
Size: 417792 |
Author: 赵鑫维 |
Hits:
Description: 你想深入学习程序设计吗,如果想学,可以看看这本书,并且里面包含源代码-Rootkits do you want to learn, if you want to learn, you can look at this book, and which contains the source code
Platform: |
Size: 5400576 |
Author: 704928782 |
Hits:
Description: Hunting rootkits with Windbg
Platform: |
Size: 431104 |
Author: omkar |
Hits:
Description: 关于freeBSD的Rootkit的安全书籍,值得关注安全方面的研发者研究。-Designing BSD Rootkits Apr 2007 pdf
Platform: |
Size: 7797760 |
Author: 搜索死 |
Hits:
Description: rootkits and bootkits 2019 Enlish edition
Platform: |
Size: 12457984 |
Author: 光帅帅 |
Hits: