DESIGNING BSD ROOTKITS AN INTRODUCTION TO KERNEL HACKING PDF

Though rootkits have a fairly negative image, they can be used for both good and evil. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.

Author:Zolokree Moogujas
Country:Angola
Language:English (Spanish)
Genre:Technology
Published (Last):25 August 2018
Pages:376
PDF File Size:5.41 Mb
ePub File Size:17.45 Mb
ISBN:870-5-77429-301-8
Downloads:12850
Price:Free* [*Free Regsitration Required]
Uploader:Arara



This title aims to give you the knowledge necessary to understand rootkits while exploring the FreeBSD operating system and kernel. Tinkering with computers has always been a primary passion of author Joseph Kong. He is a self-taught programmer who dabbles in information security, operating system theory, reverse engineering, and vulnerability assessment.

He has written for Phrack Magazine and was a system administrator for the City of Toronto. The book starts with a chapter dedicated to loadable kernel modules LKM which is natural since the majority of rootkits today are LKMs. What comes next is a look at hooking, a programming technique that employs handler functions to modify control flow. It is the most popular rootkit technique and Kong offers you an insight into how it works before moving on to discuss one of the hardest rootkit techniques to detect — direct kernel object manipulation DKOM as well as kernel object hooking KOH.

Kong continues by discussing run-time kernel memory patching and reveals how you can patch a running kernel with userland code. All the material described in previous chapters comes together when you go hands-on and get instructions on how to write a complete example rootkit that will bypass a Host Instrusion Detection System HIDS. The book concludes with a very important topic — detection.

As you can see from the details above, Designing BSD Rootkits is aimed at a knowledgeable audience that enjoys to dwell into very technical material and is comfortable with the C programming language.

Despite the low page count, the book is packed with very informative material and it delivers exactly what it promises.

A website for the book is available here. It contains some bonus content as well as all the code ready for download. All the readers that wish to work with the code will find this quite valuable. About the author Tinkering with computers has always been a primary passion of author Joseph Kong. Inside the book The book starts with a chapter dedicated to loadable kernel modules LKM which is natural since the majority of rootkits today are LKMs.

Final thoughts As you can see from the details above, Designing BSD Rootkits is aimed at a knowledgeable audience that enjoys to dwell into very technical material and is comfortable with the C programming language. Share this. Read Previous.

ACTIVASE PACKAGE INSERT PDF

Designing BSD Rootkits: An Introduction to Kernel Hacking

This title aims to give you the knowledge necessary to understand rootkits while exploring the FreeBSD operating system and kernel. Tinkering with computers has always been a primary passion of author Joseph Kong. He is a self-taught programmer who dabbles in information security, operating system theory, reverse engineering, and vulnerability assessment. He has written for Phrack Magazine and was a system administrator for the City of Toronto. The book starts with a chapter dedicated to loadable kernel modules LKM which is natural since the majority of rootkits today are LKMs.

FACOMATOSIS CLASIFICACION PDF

Designing BSD Rootkits

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.

DUMITRU STANILOAIE CARTI PDF

'+_.J(d)+'

.

Related Articles