Designing BSD Rootkits: An Introduction to Kernel Hacking
Joseph Kong
- 出版商: No Starch Press
- 出版日期: 2007-04-01
- 售價: $1,250
- 貴賓價: 9.5 折 $1,188
- 語言: 英文
- 頁數: 144
- 裝訂: Paperback
- ISBN: 1593271425
- ISBN-13: 9781593271428
-
相關分類:
駭客 Hack
已過版
買這商品的人也買了...
-
$1,500$1,425 -
$880$695 -
$999OpenGL Shading Language, 2/e (Paperback)
-
$650$507 -
$550$468 -
$690$587 -
$980$774 -
$580$493 -
$750$593 -
$480$408 -
$1,200$948 -
$620$490 -
$990UML 2 Certification Guide: Fundamental & Intermediate Exams (Paperback)
-
$880$616 -
$750$593 -
$990$891 -
$580$452 -
$600$510 -
$290$226 -
$600$480 -
$680$578 -
$520$406 -
$520$411 -
$400$316 -
$820$648
相關主題
商品描述
Description
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.
Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.
Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.
Included:
- The fundamentals of FreeBSD kernel module programming
- Using call hooking to subvert the FreeBSD kernel
- Directly manipulating the objects the kernel depends upon for its internal record-keeping
- Patching kernel code resident in main memory; in other words, altering the kernel's logic while its still running
- How to defend against the attacks described
Hack the FreeBSD kernel for yourself!
Table of Contents
Foreword by John Baldwin
Introduction
Chapter 1: Loadable Kernel Modules
Chapter 2: Hooking
Chapter 3: Direct Kernel Object Manipulation
Chapter 4: Kernel Object Hooking
Chapter 5: Run-Time Kernel Memory Patching
Chapter 6: Putting It All Together
Chapter 7: Detection
Closing Words
Bibliography
Index