ou
Identifiez-vous pour activer la commande 1-Click.
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Dites-le à l'éditeur :
J'aimerais lire ce livre sur Kindle !

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System [Anglais] [Broché]

Bill Blunden
5.0 étoiles sur 5  Voir tous les commentaires (2 commentaires client)
Prix : EUR 38,77 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 1 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Il y a une édition plus récente de cet article:
Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System 5.0 étoiles sur 5 (2)
EUR 63,90
En stock.

Offres spéciales et liens associés


Les clients ayant consulté cet article ont également regardé


Descriptions du produit

The Rootkit Arsenal: Escape and Evasion This book demonstrates how to modify a system at runtime to subvert a forensic live response. Readers will learn how to conceal their presence on a server, disable its security policies, sidestep group policy, maintain remote access, and covertly monitor system activity--all with the system administrator being none the wiser. Full description

Détails sur le produit

  • Broché: 908 pages
  • Editeur : Wordware Publishing Inc. (4 mai 2009)
  • Langue : Anglais
  • ISBN-10: 1598220616
  • ISBN-13: 978-1598220612
  • Dimensions du produit: 5 x 14,8 x 22,3 cm
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (2 commentaires client)
  • Classement des meilleures ventes d'Amazon: 153.145 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Vendre une version numérique de ce livre dans la boutique Kindle.

Si vous êtes un éditeur ou un auteur et que vous disposez des droits numériques sur un livre, vous pouvez vendre la version numérique du livre dans notre boutique Kindle. En savoir plus

Quels sont les autres articles que les clients achètent après avoir regardé cet article?


Commentaires en ligne 

4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Best topic coverage 2 novembre 2010
Format:Broché
This book, is by far the best on this topic. It is really complete and allows one to grasp the concept of subversion of the windows kernel.

A must read!
Avez-vous trouvé ce commentaire utile ?
5.0 étoiles sur 5 Excellent livre 10 novembre 2012
Par ave
Format:Broché|Achat vérifié
Un excellent livre sur les "rootkit", ces nuisibles informatiques d'un genre spécial, dont le but est de s'implanter subrepticement sur l'"hôte" sans nécessairement chercher à l'endommager directement. Il peut par exemple s'agir d'extraire des informations confidentielles ou de permettre une attaque future qui, elle, sera nocive.
Mais plus important que les rootkits eux-même, le livre regorge d'informations sur le fonctionnement interne de l'ordinateur, du microprocesseur au système d'exploitation. Cette présentation est vraiment remarquable et m'a beaucoup appris, indépendamment de l'aspect sécurité: La traduction d'adresses mémoires virtuelles/réelles par le microprocesseur, les "rings" d'exécution, comment une dll/un process fonctionne, etc... Ce qui est intéressant, c'est que, contrairement à d'autres ouvrages génériques, les explications données dans cet ouvrage ne sont pas abstraites mais très concrètes: Par exemple quel bit faut-il modifier dans le header pour permettre l'exécution d'une portion de mémoire qui ne devrait pas être exécutable?
Le seul point négatif est que les détails techniques donnés "vieillissent" très rapidement d'une version de Windows à l'autre (Le livre se base sur Vista). Néanmoins les principes et la méthodologie restent.
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.7 étoiles sur 5  20 commentaires
33 internautes sur 36 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Awesome gigantic compilation on Rootkits 16 août 2009
Par Nagareshwar Talekar - Publié sur Amazon.com
Format:Broché
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Wow...! This was my first reaction when I received this massive 900+ pages book from Amazon. I was just spell bounded and surprised to see such an enormous amount of information compiled on the lesser known area of computer security, the Rootkits.

The book starts with basics of system internals which is essential to understand the depth of Rootkits. It covers about various memory models, interrupts, TSR, Windows architecture etc in detail. Then it delves into explaining the ingredients of Rootkit including installing and launching of the Rootkit. All these system internals have been covered in very precise and concise manner.

The chapter 5 is where the real fun starts as it goes on elaborating all the hooking mechanisms from user land to kernel and then it describes various techniques for detecting these hooking mechanisms. Later chapters does awesome job of explaining the advanced Rootkit techniques. The Anti-Forensics section is just mind blowing, no explanation needed.

One of the salient features of this book is the code samples. Every technique mentioned in this book is illustrated with well explained, working code example. This along with Rootkit detection mechanisms explored in the book sets it apart from its predecessor, Rootkit - Subverting Windows Kernel.

Its clearly evident that author has taken great pain and patience to present the darkest topic of computer arena in a very simple and understandable manner in this gigantic compilation. By far this is the very good reference book and very well recommended for any one who wants to conquer the mysterious world of Rootkits.
24 internautes sur 26 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Amazing book, not just for those researching rootkits 7 octobre 2009
Par R. Wesley McGrew - Publié sur Amazon.com
Format:Broché
Bill Blunden's book, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, is one of the hidden gems out there as far as computer security books are concerned, and I hope that I can convince you to give it a look. This review has been too-long to arrive, as I haven't had the time to read that I would like. That said, I felt it was very important to finally get the review up, as this is a book that I'm sure my regular readers will enjoy.

I first spotted this book on a vendor table at Defcon, and it stood out among the rest mostly because *I hadn't heard of it*. I try to keep up with new book releases, especially on attack-oriented topics that would be of interest to the penetration testers and vulnerability analysts that read this blog. It was surprising to me that one had flown under the radar. I picked it up and flipped through the table of contents [...] (which I encourage you to do as well), and was very impressed with the amount of material it covers.

I looked up the author, and was disappointed to realize that I had missed his talk at Blackhat earlier that week (looking forward to the video). I contacted him, and he was kind enough to supply a review copy of the book. It arrived very quickly, with a humorous personal note on the inside cover, and ever since, I have been learning a lot from it.

The author's style is excellent. The material is technical and has the potential to be very dry, but the text has a very conversational tone, as if it were being presented as a lecture for a (particularly good) class. Each concept is tied back to the main topic: hiding operations and data from the user and operating system, and frustrating forensic analysis. The book reads very well, presenting enough context that you can understand it if you're reading away from a computer, and enough detail that you can follow along and experiment with it if you are at your desk.

I appreciate that this book does not attempt to hold the reader's hand throughout with the ethics of developing rootkits. The author takes a brief moment at the beginning of the book to explain the legitimate needs for security professionals to be familiar with rootkit techniques and development, and points out that the information can be found elsewhere. After this point, the book assumes a level of maturity in its reader that is greatly appreciated.

The first part of the book, "Foundations", has an excellent introduction to IA32 architecture and Windows internals that I have never seen so well-described for beginners. Even if you aren't interested in rootkits, this portion of the book is something I would recommend to anyone getting started in related fields, like reverse-engineering or exploit development. Digging further into the text, the second section on "System Modification" makes up the "meat" of the book, delving into the details of subverting Windows internals in many different ways. As technical and in-depth as the book gets, though, it never seems to leave the reader behind. Each new concept is well-explained and builds upon the material the reader has already learned. You may have to go through the text slower than you had anticipated, and go back to review previous material, but you're never left feeling hopelessly lost.

The remainder of the book is a treat, as well. I can't recall another book that goes into any kind of detail on defeating forensic analysis of memory and file systems. Anyone interested in developing forensic tools or curious about how analysis with tools like Encase and FTK might be subverted, should give it a read. The author closes the text with some strategic guidelines for rootkit development, and his own thoughts on how evasion and deception can be used to similar ends on a larger scale than operating systems.

This is now one of my favorite computer security books, and I believe that if you review its contents, you'll find that you're getting a great value for your money. If you are familiar with C and have a beginner's knowledge of IA-32 assembly, you should have the prerequisites you need to follow along with this book. I highly recommend it, and hope that it becomes less-hidden of a gem that it already is.
14 internautes sur 15 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Whoa! 11 août 2009
Par Hugh K. Boyd - Publié sur Amazon.com
Format:Broché
Man! This thing is dangerous! The first couple of chapters provide probably one of the best overviews I've seen on the topics of IA86 and Win32 architecture. Then we get into the meat of the techniques for building rootkits. Finally, the author goes into anti-forensics. It's about as deep a dive into the subject as you'll find anywhere with examples that demonstrate how to use rootkits to pull off privilege escalation exploits, subverting group policy, hiding applications, and drivers, etc, etc. After the tutorial chapters, there are gobs and gobs of code (I only wish that it were on CD or downloadable -- but you actually learn from entering and building it). Be forewarned: the code really works!
9 internautes sur 10 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 More than just a rootkit book 18 août 2009
Par J. Clark - Publié sur Amazon.com
Format:Broché
You cannot become an expert at developing Windows Rootkits without first gaining a thorough understanding of Intel system architecture, Windows architecture and the Windows Driver Model. This book provides some of the best coverage I've seen of those topics, in addition to providing a VERY complete coverage of rootkit development.
9 internautes sur 11 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Leading candidate for Best Book Bejtlich Read 2010 24 avril 2010
Par Richard Bejtlich - Publié sur Amazon.com
Format:Broché
Disclaimer: Bill mentions me and my book "Real Digital Forensics" on pages xxvi and 493. He sent me a free review copy of his book.

"Wow." That summarizes my review of "The Rootkit Arsenal" (TRA) by Bill Blunden. If you're a security person and you plan to read one seriously technical book this year, make it TRA. If you decide to really focus your attention, and try the examples in the book, you will be able to write Windows rootkits. Even without taking a hands-on approach, you will learn why you can't trust computers to defend themselves or report their condition in a trustworthy manner.

Author Bill Blunden is an excellent technical writer. He keeps the reader's attention despite the mind-numbing complexity of some of his topics. He also provides exceptional background material and knows how to lead the reader through a series of learning sessions prior to directly addressing writing rootkits. Thanks to this progressive method, the reader acquires a thorough grounding in a variety of topics neglected by other texts. I highly recommend reading this book prior to other books on rootkits, although motivated readers might want to read books like Windows Internals, 5th Ed, prior to TRA.

I especially appreciated Bill's practical approach; he frequently shares tips to solve problems readers will encounter. For example, he describes how to access Microsoft symbols via a remote symbol server, rather than just downloading outdated symbols to a local system. He also explained how to set up a remote kernel debugger using a null modem.

Two other aspects of TRA made an impression on me. Bill very thoroughly discusses Windows and rootkit technology. He outlines numerous options, then examines the pros and cons of each technique. Bill also gives plenty of credit to rootkit pioneers by name, and cites their work frequently. I applaud authors who give both give credit where it is due and recognize that they build on the work of their predecessors.

I have no complaints with TRA. An earlier reviewer bemoaned not be able to download source code from the book's examples, but they are online. (I posted a link in a comment to that earlier review.) I must admit I am not a rootkit developer, so I am not qualified to comment on the nature of the techniques nor the way Bill implements them in his code. However, readers who want to validate his recommendations can download and implement his code for themselves.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?