- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Designing BSD Rootkits: An Introduction to Kernel Hackingby Joseph Kong
Synopses & Reviews
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.
Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.
Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.
Hack the FreeBSD kernel for yourself!
Book News Annotation:
A rootkit is a set of code designed to conceal processes, files, or system data from a computer's operating system. Although they have a negative image, these tools may be used for either productive or destructive purposes. Aimed at programmers with an interest in introductory kernel hacking, this text provides an overview of current, popular rootkit techniques. Rootkit detection and removal is covered in the final section. A self-taught programmer, Kong is a former system administrator for the City of Toronto. Annotation ©2007 Book News, Inc., Portland, OR (booknews.com)
"Designing BSD Rootkits" introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. Written in a friendly, accessible style and sprinkled with geek humor and pop culture references, the author favors a "learn by example" approach that assumes no prior kernel hacking experience.
About the Author
Tinkering with computers has always been a primary passion of author Joseph Kong. He is a self-taught programmer who dabbles in information security, operating system theory, reverse engineering, and vulnerability assessment. He has written for Phrack Magazine and was a system administrator for the City of Toronto.
Table of Contents
DedicationACKNOWLEDGMENTSFOREWORDINTRODUCTIONChapter 1: LOADABLE KERNEL MODULESChapter 2: HOOKINGChapter 3: DIRECT KERNEL OBJECT MANIPULATIONChapter 4: KERNEL OBJECT HOOKINGChapter 5: RUN-TIME KERNEL MEMORY PATCHINGChapter 6: PUTTING IT ALL TOGETHERChapter 7: DETECTIONChapter 8: CLOSING WORDSBIBLIOGRAPHYCOLOPHON
What Our Readers Are Saying
Other books you might like
Computers and Internet » Internet » General