- Joined
- Nov 19, 2023
- Messages
- 2,718
- Reaction score
- 24,654
- Points
- 113
- Thread Author
- #1
Rootkits and bootkits. Reverse Engineering Malware and Next Generation Threats [RU]
: This book is dedicated to the detection, analysis and reverse engineering
of malware. The first part describes examples of rootkits that show
how an attacker sees the operating system from the inside and finds ways to securely
inject his implants using the OS's own structures. The second part
talks about the evolution of bootkits, the conditions that spurred this evolution, and
methods for reverse engineering such threats.
The publication is addressed to a wide range of information
security specialists interested in how modern malware
bypasses security mechanisms at the operating system level.
: This book is dedicated to the detection, analysis and reverse engineering
of malware. The first part describes examples of rootkits that show
how an attacker sees the operating system from the inside and finds ways to securely
inject his implants using the OS's own structures. The second part
talks about the evolution of bootkits, the conditions that spurred this evolution, and
methods for reverse engineering such threats.
The publication is addressed to a wide range of information
security specialists interested in how modern malware
bypasses security mechanisms at the operating system level.
To see this hidden content, you must reply and react with one of the following reactions : Like, Love, Haha, Wow