Designing BSD Rootkits

An Introduction to Kernel Hacking



Bookstore > Books > Designing BSD Rootkits

Price$12.99 - $23.99
Rating
AuthorJoseph Kong
PublisherNo Starch Press
Published2007
Pages142
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101593271425
ISBN-139781593271428
EBook Hardcover Paperback

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.

Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.

Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.




5 5 97

Similar Books


Hacking Exposed Malware and Rootkits

Hacking Exposed Malware and Rootkits

by Michael Davis, Sean Bodmer, Aaron LeMasters

Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in t...

Publisher:  McGraw-Hill  |  Release:  2009

Designing Social Interfaces

Designing Social Interfaces

by Christian Crumlish, Erin Malone

From the creators of Yahoo!'s Design Pattern Library, Designing Social Interfaces provides you with more than 100 patterns, principles, and best practices, along with salient advice for many of the common challenges you'll face when starting a social website. Christian Crumlish and Erin Malone share hard-won insights into what w...

Price:  $3.65  |  Publisher:  O'Reilly Media  |  Release:  2009

Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy counterm...

Price:  $6.00  |  Publisher:  McGraw-Hill  |  Release:  2016

Designing Forms for Microsoft Office InfoPath and Forms Services 2007

Designing Forms for Microsoft Office InfoPath and Forms Services 2007

by Scott Roberts, Hagen Green

Microsoft Office InfoPath 2007 offers breakthrough tools for gathering, managing, and integrating business-critical information, and creating efficient forms-driven processes. Two longtime members of Microsoft's InfoPath product team have written the first comprehensive, hands-on guide to building successful XML-based solutions with ...

Price:  $9.76  |  Publisher:  Addison-Wesley  |  Release:  2007

Designing the iPhone User Experience

Designing the iPhone User Experience

by Suzanne Ginsburg

Given the fiercely competitive state of the iPhone app landscape, it has become increasingly challenging for app designers and developers to differentiate their apps. The days are long gone when it was possible to crank out an app over the weekend and refine it after receiving a few not so flattering user reviews. Users now have choices -...

Price:  $1.44  |  Publisher:  Addison-Wesley  |  Release:  2010

Rootkits For Dummies

Rootkits For Dummies

by Larry Stevenson, Nancy Altholz

A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can us...

Price:  $7.55  |  Publisher:  Wiley  |  Release:  2007

Designing Large Scale Lans

Designing Large Scale Lans

by Kevin Dooley

This unique book outlines the advantages of a top-down, vendor-neutral approach to network design. Everything from network reliability, network topologies, routing and switching, wireless, virtual LANs, firewalls and gateways to security, Internet protocols, bandwidth, and multicast services are covered from the perspective of an organiza...

Price:  $3.49  |  Publisher:  O'Reilly Media  |  Release:  2001

BSD Hacks

BSD Hacks

by Dru Lavigne

Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If you want more than the aver...

Price:  $6.59  |  Publisher:  O'Reilly Media  |  Release:  2004