E-Book, Englisch, 336 Seiten
Metula Managed Code Rootkits
1. Auflage 2010
ISBN: 978-1-59749-575-2
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Hooking into Runtime Environments
E-Book, Englisch, 336 Seiten
ISBN: 978-1-59749-575-2
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Erez Metula (CISSP) is an application security researcher specializing in secure development practices, penetration testing, code reviews, and security training for developers. He has extensive hands-on experience performing security assessments and training for organizations worldwide. Erez is the founder of AppSec. He is also a leading instructor at many information security training sessions. He is a constant speaker at security conferences, and has spoken at Black Hat, DEF CON, CanSecWest, OWASP, and more.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Managed Code Rootkits;4
3;Copyright;5
4;Table of Contents;6
5;Acknowledgements;12
6;About the Author;14
7;Part I: Overview;16
7.1;Chapter 1. Introduction;18
7.1.1;The Problem of Rootkits and Other Types of Malware;19
7.1.2;Why Do You Need This Book?;21
7.1.3;Terminology Used in This Book;24
7.1.4;Technology Background: An Overview;25
7.1.5;Summary;36
7.2;Chapter 2. Managed Code Rootkits;38
7.2.1;What Can Attackers Do with Managed Code Rootkits?;39
7.2.2;Common Attack Vectors;41
7.2.3;Why Are Managed Code Rootkits Attractive to Attackers?;45
7.2.4;Summary;50
7.2.5;Endnotes;51
8;Part II: Malware Development;52
8.1;Chapter 3. Tools of the Trade;54
8.1.1;The Compiler;55
8.1.2;The Decompiler;57
8.1.3;The Assembler;61
8.1.4;The Disassembler;64
8.1.5;The Role of Debuggers;67
8.1.6;The Native Compiler;71
8.1.7;File Monitors;75
8.1.8;Summary;76
8.2;Chapter 4. Runtime Modification;78
8.2.1;Is It Possible to Change the Definition of a Programming Language?;78
8.2.2;Walkthrough: Attacking the Runtime Class Libraries;86
8.2.3;Summary;114
8.3;Chapter 5. Manipulating the Runtime;116
8.3.1;Manipulating the Runtime According to Our Needs;116
8.3.2;Reshaping the Code;144
8.3.3;Code Generation;154
8.3.4;Summary;157
8.4;Chapter 6. Extending the Language with a Malware API;158
8.4.1;Why Should We Extend the Language?;158
8.4.2;Extending the Runtime with a Malware API;161
8.4.3;Summary;194
8.4.4;Endnote;195
8.5;Chapter 7. Automated Framework Modification;196
8.5.1;What is ReFrameworker?;197
8.5.2;ReFrameworker Modules Concept;199
8.5.3;Using the Tool;211
8.5.4;Developing New Modules;221
8.5.5;Setting Up the Tool;227
8.5.6;Summary;231
8.6;Chapter 8. Advanced Topics;234
8.6.1;“Object-Oriented-Aware ” Malware;235
8.6.2;Thread Injection;246
8.6.3;State Manipulation;252
8.6.4;Covering the Traces As Native Code;262
8.6.5;Summary;272
9;Part III: Countermeasures;274
9.1;Chapter 9. Defending against MCRs;276
9.1.1;What Can We Do about This Kind of Threat ?;276
9.1.2;Awareness: Malware Is Everybody’s Problem;278
9.1.3;The Prevention Approach;283
9.1.4;The Detection Approach;287
9.1.5;The Response Approach;299
9.1.6;Summary;304
9.1.7;Endnote;305
10;Part IV: Where Do We Go from Here?;306
10.1;Chapter 10. Other Uses of Runtime Modification;308
10.1.1;Runtime Modification As an Alternative Problem-Solving Approach;308
10.1.2;Runtime Hardening;312
10.1.3;Summary;325
11;Index;326




