- Paperback: 908 pages
- Publisher: Jones & Bartlett Learning; 1 edition (May 4, 2009)
- Language: English
- ISBN-10: 1598220616
- ISBN-13: 978-1598220612
- Product Dimensions: 6.1 x 1.8 x 9.2 inches
- Shipping Weight: 2.4 pounds
- Average Customer Review: 4.7 out of 5 stars See all reviews (21 customer reviews)
- Amazon Best Sellers Rank: #641,604 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Rootkit Arsenal: Escape and Evasion: Escape and Evasion in the Dark Corners of the System Paperback – May 4, 2009
There is a newer edition of this item:
ITPro.TV Video Training
Take advantage of IT courses online anywhere, anytime with ITPro.TV. Learn more.
Customers Who Bought This Item Also Bought
Top Customer Reviews
Wow...! This was my first reaction when I received this massive 900+ pages book from Amazon. I was just spell bounded and surprised to see such an enormous amount of information compiled on the lesser known area of computer security, the Rootkits.
The book starts with basics of system internals which is essential to understand the depth of Rootkits. It covers about various memory models, interrupts, TSR, Windows architecture etc in detail. Then it delves into explaining the ingredients of Rootkit including installing and launching of the Rootkit. All these system internals have been covered in very precise and concise manner.
The chapter 5 is where the real fun starts as it goes on elaborating all the hooking mechanisms from user land to kernel and then it describes various techniques for detecting these hooking mechanisms. Later chapters does awesome job of explaining the advanced Rootkit techniques. The Anti-Forensics section is just mind blowing, no explanation needed.
One of the salient features of this book is the code samples. Every technique mentioned in this book is illustrated with well explained, working code example. This along with Rootkit detection mechanisms explored in the book sets it apart from its predecessor, Rootkit - Subverting Windows Kernel.
Its clearly evident that author has taken great pain and patience to present the darkest topic of computer arena in a very simple and understandable manner in this gigantic compilation. By far this is the very good reference book and very well recommended for any one who wants to conquer the mysterious world of Rootkits.
I first spotted this book on a vendor table at Defcon, and it stood out among the rest mostly because *I hadn't heard of it*. I try to keep up with new book releases, especially on attack-oriented topics that would be of interest to the penetration testers and vulnerability analysts that read this blog. It was surprising to me that one had flown under the radar. I picked it up and flipped through the table of contents [...] (which I encourage you to do as well), and was very impressed with the amount of material it covers.
I looked up the author, and was disappointed to realize that I had missed his talk at Blackhat earlier that week (looking forward to the video). I contacted him, and he was kind enough to supply a review copy of the book. It arrived very quickly, with a humorous personal note on the inside cover, and ever since, I have been learning a lot from it.
The author's style is excellent. The material is technical and has the potential to be very dry, but the text has a very conversational tone, as if it were being presented as a lecture for a (particularly good) class. Each concept is tied back to the main topic: hiding operations and data from the user and operating system, and frustrating forensic analysis.Read more ›
"Wow." That summarizes my review of "The Rootkit Arsenal" (TRA) by Bill Blunden. If you're a security person and you plan to read one seriously technical book this year, make it TRA. If you decide to really focus your attention, and try the examples in the book, you will be able to write Windows rootkits. Even without taking a hands-on approach, you will learn why you can't trust computers to defend themselves or report their condition in a trustworthy manner.
Author Bill Blunden is an excellent technical writer. He keeps the reader's attention despite the mind-numbing complexity of some of his topics. He also provides exceptional background material and knows how to lead the reader through a series of learning sessions prior to directly addressing writing rootkits. Thanks to this progressive method, the reader acquires a thorough grounding in a variety of topics neglected by other texts. I highly recommend reading this book prior to other books on rootkits, although motivated readers might want to read books like Windows Internals, 5th Ed, prior to TRA.
I especially appreciated Bill's practical approach; he frequently shares tips to solve problems readers will encounter. For example, he describes how to access Microsoft symbols via a remote symbol server, rather than just downloading outdated symbols to a local system. He also explained how to set up a remote kernel debugger using a null modem.
Two other aspects of TRA made an impression on me. Bill very thoroughly discusses Windows and rootkit technology. He outlines numerous options, then examines the pros and cons of each technique.Read more ›
Most Recent Customer Reviews
I haven't used it I'm told it is useful. I ordered it for someone else. It arrived and I looked at it that was about it!Published on March 29, 2014 by Rdubbu
I bought this book in anticipation of a class I had to teach regarding system calls in Windows and Linux operating systems. Read morePublished on January 9, 2013 by Sergio A. Becerril Lopez
Thanks Prometheus! More usable and secret knowledge in this small library than in both my IT and Occult libraries combined! I owe you one.Published on September 8, 2012 by T. W. Edgin
This book like kind teacher. explain hard topics very easily. it expanded my understanding about win32 internal works. Good for every developers ..except newbiesPublished on July 15, 2012 by Mark Yang
I'm a computer security specialist and wanted to extend my knowledge of programming and computer security to cover rootkits. Read morePublished on September 10, 2011 by Doug Daly
The book is definitely grossly padded for marketability.
Out of 900 pages, 213 (23.7%) are taken by the examples' source code with extensive fragments of it repeated in the... Read more
It's not too often that a hefty 900 page technical book manages to hold your rapt attention on a plane ride. Read morePublished on May 14, 2011 by Atul Khare
Wish I had more time for this book. You should have a decent understanding of C code and just a good foundation. Great fo beginners and advanced people. Read morePublished on April 4, 2011 by Mr.