• Managed Code Rootkits: Hooking into Runtime Environments See large image

    Managed Code Rootkits: Hooking into Runtime Environments (Syngress Media) (Paperback) By (author) Erez Metula

    $37.95 - Save $12.09 24% off - RRP $50.04 Free delivery worldwide Available
    Dispatched in 2 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionManaged Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks, which are developed in intermediate language. The initial part of the book offers an overview of managed code rootkits. It explores environment models of managed code and the relationship of managed code to rootkits by studying how they use application VMs. It also discusses attackers of managed code rootkits and various attack scenarios. The second part of the book covers the development of managed code rootkits, starting with the tools used in producing managed code rootkits through their deployment. The next part focuses on countermeasures that can possibly be used against managed code rootkits, including technical solutions, prevention, detection, and response tactics. The book concludes by presenting techniques that are somehow similar to managed code rootkits, which can be used in solving problems. * Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews* Introduces the reader briefly to managed code environments and rootkits in general* Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation* Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios


Other books

Other books in this category
Showing items 1 to 11 of 11

 

Reviews | Bibliographic data
  • Full bibliographic data for Managed Code Rootkits

    Title
    Managed Code Rootkits
    Subtitle
    Hooking into Runtime Environments
    Authors and contributors
    By (author) Erez Metula
    Physical properties
    Format: Paperback
    Number of pages: 336
    Width: 188 mm
    Height: 231 mm
    Thickness: 25 mm
    Weight: 680 g
    Language
    English
    ISBN
    ISBN 13: 9781597495745
    ISBN 10: 1597495743
    Classifications

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 20
    BISAC V2.8: COM032000
    Warengruppen-Systematik des deutschen Buchhandels: 16320
    B&T Modifier: Academic Level: 03
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    B&T Merchandise Category: COM
    BIC subject category V2: URD
    LC subject heading:
    BISAC V2.8: COM053000
    DC22: 005.8
    LC subject heading:
    BIC subject category V2: URH
    Ingram Subject Code: XY
    LC subject heading: , , , ,
    LC classification: QA76.9.A25 M487 2011
    Thema V1.0: URH
    Illustrations note
    Approx. 153 Illustrations
    Publisher
    Syngress Media,U.S.
    Imprint name
    Syngress Media,U.S.
    Publication date
    25 November 2010
    Publication City/Country
    Rockland, MA
    Author Information
    Erez Metula (CISSP) is an application security researcher specializing in secure development practices, penetration testing, code reviews, and security training for developers. He has extensive hands-on experience performing security assessments and training for organizations worldwide. Erez is the founder of AppSec. He is also a leading instructor at many information security training sessions. He is a constant speaker at security conferences, and has spoken at Black Hat, DEF CON, CanSecWest, OWASP, and more.
    Review quote
    "A well-put-together work: I was able to put some of the tasks to work for me right away. An excellent resource: Technical enough to be useful, but not overly technical." -- Chris Griffin, Trainer, ISECOM USA "As someone who has to deal with .NET security every day, I always look for new ideas and tools to make .NET applications more secure. This book provides both. It's especially valuable when you have to protect apps without having access to their original source code." -- Kyle C. Quest, GREM, GWAPT, GCIH, GCFA, GCIA, GCWN, GCUX, GCFW, GSNA, CISSP, CIPP, Director of Security Engineering, MetraTech "Overall the book is very well structured and presented in a way that maintains the reader's interest as the author delves ever deeper into why hackers use MCRs to target an organisation's applications. Continuity of the content is maintained by helpful summaries at the end of each chapter. Mr Metula is a consummate and talented security practitioner who knows his subject thoroughly. I consider this book to be excellent value for money and would recommend it to any security professional. In today's austere economic climate, modern IT solutions are being sought that are proven value for money. The use of virtual servers is rapidly increasing as they provide better utilisation and increased productivity of existing resources. This book highlights the risks of adopting such technology and provides valuable advice on countermeasures to mitigate those risks."--InfoSecReviews.com "In today's austere economic climate, modern IT solutions are being sought?that are proven value for money. The use of virtual servers is rapidly increasing?as they provide better utilisation and increased productivity of existing resources. This book highlights the risks of adopting such technology and provides valuable advice on countermeasures to mitigate those risks."--Best Hacking and Pen Testing Books in InfoSecReviews Book Awards
    Table of contents
    Part I: Overview Chapter 1: Introduction Chapter 2: Managed Code Rootkits Part II: Malware Development Chapter 3: Tools of the Trade Chapter 4: Runtime Modification Chapter 5: Manipulating the Runtime Chapter 6: Extending the Language with a Malware API Chapter 7: Automated Framework Modification Chapter 8: Advanced Topics Part III: Countermeasures Chapter 9: Defending against MCRs Part IV: Where Do We Go from Here? Chapter 10: Other Uses of Runtime Modification