Text
The rootkit arsenal: escape and evasion in the dark corners of the system
Table of contents:
Preface: Metadata
Pt. I. Foundations
Ch. 1. Setting the Stage
Ch. 2. Into the Catacombs: IA-32
Ch. 3. Windows System Architecture
Ch. 4. Rootkit Basics
Pt. II. System Modification
Ch. 5. Hooking Call Tables
Ch. 6. Patching System Routines
Ch. 7. Altering Kernel Objects
Ch. 8. Deploying Filter Drivers
Pt. III. Anti-Forensics
Ch. 9. Defeating Live Response
Ch. 10. Defeating File System Analysis
Ch. 11. Defeating Network Analysis
Ch. 12. Countermeasure Summary
Pt. IV. End Material
Ch. 13. The Tao of Rootkits
Ch. 14. Closing Thoughts.
No other version available