Designing BSD Rootkits
An Introduction to Kernel Hacking
Price | $12.99 - $23.99
|
Rating | |
Author | Joseph Kong |
Publisher | No Starch Press |
Published | 2007 |
Pages | 142 |
Language | English |
Format | Paper book / ebook (PDF) |
ISBN-10 | 1593271425 |
ISBN-13 | 9781593271428 |
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.
Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.
Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.
Chapter 2:
→ https://itbook.store/files/9781593271428/chapter2.pdf
Source Code:
→ https://itbook.store/files/9781593271428/sourcecode.zip
- Joseph Kong
5 5 97
Similar Books
Hacking Exposed Malware and Rootkits
by Michael Davis, Sean Bodmer, Aaron LeMasters
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in t...
Publisher: McGraw-Hill | Release: 2009
by Christian Crumlish, Erin Malone
From the creators of Yahoo!'s Design Pattern Library, Designing Social Interfaces provides you with more than 100 patterns, principles, and best practices, along with salient advice for many of the common challenges you'll face when starting a social website. Christian Crumlish and Erin Malone share hard-won insights into what w...
Price: $3.65 | Publisher: O'Reilly Media | Release: 2009
Hacking Exposed Malware & Rootkits, 2nd Edition
by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy counterm...
Price: $6.00 | Publisher: McGraw-Hill | Release: 2016
Designing Forms for Microsoft Office InfoPath and Forms Services 2007
by Scott Roberts, Hagen Green
Microsoft Office InfoPath 2007 offers breakthrough tools for gathering, managing, and integrating business-critical information, and creating efficient forms-driven processes. Two longtime members of Microsoft's InfoPath product team have written the first comprehensive, hands-on guide to building successful XML-based solutions with ...
Price: $9.76 | Publisher: Addison-Wesley | Release: 2007
Designing the iPhone User Experience
by Suzanne Ginsburg
Given the fiercely competitive state of the iPhone app landscape, it has become increasingly challenging for app designers and developers to differentiate their apps. The days are long gone when it was possible to crank out an app over the weekend and refine it after receiving a few not so flattering user reviews. Users now have choices -...
Price: $1.44 | Publisher: Addison-Wesley | Release: 2010
by Larry Stevenson, Nancy Altholz
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can us...
Price: $7.55 | Publisher: Wiley | Release: 2007
by Kevin Dooley
This unique book outlines the advantages of a top-down, vendor-neutral approach to network design. Everything from network reliability, network topologies, routing and switching, wireless, virtual LANs, firewalls and gateways to security, Internet protocols, bandwidth, and multicast services are covered from the perspective of an organiza...
Price: $3.49 | Publisher: O'Reilly Media | Release: 2001
by Dru Lavigne
Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If you want more than the aver...
Price: $6.59 | Publisher: O'Reilly Media | Release: 2004