Limit search to available items
Book Cover
E-book
Author Davis, Michael, 1982- author.

Title Hacking exposed : malware and rootkits : security secrets & solutions / Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Edition Second edition
Published New York : McGraw-Hill Education, [2017]
©2017

Copies

Description 1 online resource (1 volume) : illustrations
Series Hacking Exposed Ser
Hacking Exposed Ser
Contents Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Malware -- CASE STUDY: Please Review This Before Our Quarterly Meeting -- 1 Malware Propagation -- Malware Is Still King -- The Spread of Malware -- Why They Want Your Workstation -- Intent Is Hard to Detect -- It's a Business -- Significant Malware Propagation Techniques -- Social Engineering -- File Execution -- Modern Malware Propagation Techniques -- StormWorm -- Metamorphism -- Obfuscation -- Dynamic Domain Name Services -- Fast Flux
Malware Propagation Injection Vectors -- Email -- Malicious Websites -- Phishing -- Peer-to-Peer (P2P) -- Worms -- Summary -- 2 Malware Functionality -- What Malware Does Once It's Installed -- Pop-ups -- Search Engine Redirection -- Data Theft -- Click Fraud -- Identity Theft -- Keylogging -- Malware Behaviors -- Identifying Installed Malware -- Typical Install Locations -- Installing on Local Drives -- Modifying Timestamps -- Affecting Processes -- Disabling Services -- Modifying the Windows Registry -- Summary -- Part II Rootkits
CASE STUDY: The Invisible Rootkit That Steals Your Bank Account Data -- Disk Access -- Firewall Bypassing -- Backdoor Communication -- Intent -- Presence and Significance -- 3 User-Mode Rootkits -- Rootkits -- Timeline -- Major Features of Rootkits -- Types of Rootkits -- User-Mode Rootkits -- What Are User-Mode Rootkits? -- Background Technologies -- Injection Techniques -- Hooking Techniques -- User-Mode Rootkit Examples -- Summary -- 4 Kernel-Mode Rootkits -- Ground Level: x86 Architecture Basics -- Instruction Set Architectures and the Operating System -- Protection Rings
Bridging the Rings -- Kernel Mode: The Digital Wild West -- The Target: Windows Kernel Components -- The Win32 Subsystem -- What Are These APIs Anyway? -- The Concierge: NTDLL. DLL -- Functionality by Committee: The Windows Executive (NTOSKRNL. EXE) -- The Windows Kernel (NTOSKRNL. EXE) -- Device Drivers -- The Windows Hardware Abstraction Layer (HAL) -- Kernel Driver Concepts -- Kernel-Mode Driver Architecture -- Gross Anatomy: A Skeleton Driver -- WDF, KMDF, and UMDF -- Kernel-Mode Rootkits -- What Are Kernel-Mode Rootkits? -- Challenges Faced by Kernel-Mode Rootkits -- Methods and Techniques
Kernel-Mode Rootkit Samples -- Klog by Clandestiny -- AFX by Aphex -- FU and FUTo by Jamie Butler, Peter Silberman, and C.H.A.O.S -- Shadow Walker by Sherri Sparks and Jamie Butler -- He4Hook by He4 Team -- Sebek by The Honeynet Project -- Summary -- Summary of Countermeasures -- 5 Virtual Rootkits -- Overview of Virtual Machine Technology -- Types of Virtual Machines -- The Hypervisor -- Virtualization Strategies -- Virtual Memory Management -- Virtual Machine Isolation -- Virtual Machine Rootkit Techniques -- Rootkits in the Matrix: How Did We Get Here?! -- What Is a Virtual Rootkit?
Summary Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed"!Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology." Learn how malware infects, survives, and propagates across an enterprise " See how hackers develop malicious code and target vulnerable systems " Detect, neutralize, and remove user-mode and kernel-mode rootkits " Use hypervisors and honeypots to uncover and kill virtual rootkits " Defend against keylogging, redirect, click fraud, and identity theft " Block spear phishing, client-side, and embedded-code exploits " Effectively deploy the latest antivirus, pop-up blocker, and firewall software " Identify and stop malicious processes using IPS solutions
Notes Includes index
Online resource; title from title page (viewed January 13, 2017)
Subject Computer security
Computer networks -- Security measures.
Malware (Computer software)
Rootkits (Computer software)
Computer Security
Computer networks -- Security measures
Computer security
Malware (Computer software)
Rootkits (Computer software)
Form Electronic book
Author Elisan, Christopher C., author
Bodmer, Sean, author
LeMasters, Aaron, author
ISBN 9780071825757
0071825754