CARVIEW |


Designing BSD Rootkits
By: Joseph Kong
Publisher: No Starch Press
Pub. Date: April 9, 2007
Print ISBN-13: 978-1-59327-142-8
Pages in Print Edition: 152
Subscriber Rating:
[0 Ratings]
Overview

Design and Implementation of the FreeBSD Operating System, The
by Marshall Kirk McKusick; George V. Neville-Neil
Top Sellers in this Category

Hacking: The Art of Exploitation, 2nd Edition
by Jon Erickson

The Manga Guide to Statistics
by Shin Takahashi

Java Persistence with Hibernate
by Christian Bauer; Gavin King
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.
Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.
Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.
Included:
The fundamentals of FreeBSD kernel module programming
Using call hooking to subvert the FreeBSD kernel
Directly manipulating the objects the kernel depends upon for its internal record-keeping
Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running
How to defend against the attacks described
Hack the FreeBSD kernel for yourself!
Subscriber Reviews
Average Rating: Based on 0 Ratings
No Subscribers have provided a review for this book.
Browse Similar Topics
Top Level Categories:
Information Technology & Software Development
Sub-Categories:
Information Technology & Software Development > Networking
Networking > Intrusion Detection
Some information on this page was provided using data from Amazon.com®. View at Amazon >
Extras
The publisher has provided additional content related to this title.
Description | Content |
---|---|
These links have been provided by the publisher. |
About Safari Books Online •
Terms of Service •
Gift Subscriptions •
Privacy Policy •
Contact Us •
Corporate Licenses •
Help •
Accessibility |
Copyright 2011Safari Books Online. All rights reserved.