HACKING EXPOSED MALWARE AND ROOTKITS (häftad)
Fler böcker inom
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
400
Utgivningsdatum
2009-11-01
Förlag
McGraw-Hill Education
Medarbetare
Bodmer, Sean M. / Lemasters, Aaron
Illustrationer
illustrations
Dimensioner
228 x 184 x 19 mm
Vikt
657 g
Antal komponenter
1
ISBN
9780071591188

HACKING EXPOSED MALWARE AND ROOTKITS

Malware and Rootkits Secrets and Solutions

Häftad,  Engelska, 2009-11-01

Slutsåld

"a harrowing guide to where the bad guys hide, and how you can find them." --dan kaminsky, director of penetration testing, ioactive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army

defend against the ongoing wave of malware and rootkit assaults the failsafe hacking exposed way. real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. step-by-step countermeasures provide proven prevention techniques. find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. the latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.
  • Understand how malware infects, survives, and propagates across an enterprise
  • Learn how hackers use archivers, encryptors, and packers to obfuscate code
  • Implement effective intrusion detection and prevention procedures
  • Defend against keylogging, redirect, click fraud, and identity theft threats
  • Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits
  • Prevent malicious website, phishing, client-side, and embedded-code exploits
  • Protect hosts using the latest antivirus, pop-up blocker, and firewall software
  • Identify and terminate malicious processes using HIPS and NIPS
Visa hela texten

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Michael A Davis

Övrig information

Michael A. Davis is CEO of Savid Technologies, Inc. a national technology and security consulting firm. Michael is well known in the Open Source Security industry with his porting of security tools to the Windows platforms including tools such as snort, ngrep, dsniff, and honeyd.Michael is also a member of the Honeynet project where he is working to develop data and network control mechanisms for windows based honeynets. Michael is also the developer of sebek for windows, a kernel based data collection and monitoring tool for honeynets.Michael has worked with McAfee, Inc. a leader in anti-virus protection and vulnerability management, as Senior Manager of Global Threats where he lead a team of researchers investigating confidential and cutting edge security research. Prior to McAfee, Michael A. Davis worked at Foundstone.



Sean M. Bodmer CISSP CEHSean M. Bodmer is Director of Federal and Military Programs at Savid Corporation, Inc. Sean is an active Honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Most notably he has spent several years leading the operations and analysis of advanced intrusion detection systems (honeynets) where the motives and intent of attackers and their tools can be captured and analyzed in order to generate actionable intelligence to further protect customer networks. Sean has worked in various Systems Security Engineering roles for various federal government entities and private corporations over the past decade in the Washington D.C. Metro area. Sean has lectured across the United States at industry conferences such as DEFCON, PhreakNIC, DC3, NW3C, Carnegie Mellon CERT, and the Pentagon Security Forum all covering the aspects of attack and attacker assessment profiling in order to identify the true motivations and intent behind cyber attacks.



Aaron LeMasters, CISSP, GCIH, CSTPAaron LeMasters (M.S. George Washington University) is a seasoned computer nerd specializing in computer forensics and vulnerability analysis. The first five years of his career were spent fighting to defend global DoD networks, and he is now a Senior Software Engineer at Raytheon. Aaron prefers to pacify his short attention span with advanced research and development issues related to Windows internals, system integrity, Reverse Engineering and Malware Analysis. He is an enthusiastic prototypist and enjoys developing tools that complement his research interests. In his spare time, Aaron plays basketball, sketches, jams on his Epiphone Les Paul, and travels frequently to New York City with his wife.

Innehållsförteckning

Part I Malware
Case Study: Please Review This Before Our Quarterly Meeting
Chapter 1 Method of Infection
Chapter 2 Malware Functionality
Part II Rootkits
Case Study: The Invisible Rootkit That Steals Your Bank Account Data
Chapter 3 User-Mode Rootkits
Chapter 4 Kernel-Mode Rootkits
Chapter 5 Virtual Rootkits
Chapter 6 The Future of Rootkits: If You Think It's Bad Now
Part III Prevention Technologies
Case Study: A Wolf In Sheep's Clothing
Chapter 7 Antivirus
Chapter 8 Host Protection Systems
Chapter 9 Host-Based Intrusion Prevention
Chapter 10 Rootkit Detection
Chapter 11 General Security Practices
Appendix A System Integrity Analysis: Building Your Own Rootkit Detector
Index