Nytro Posted October 6, 2014 Report Posted October 6, 2014 Rootkits: Subverting the Windows KernelBy Greg Hoglund, James Butler...............................................Publisher: Addison Wesley ProfessionalPub Date: July 22, 2005ISBN: 0-321-29431-9Pages: 352Table of Contents | IndexCopyrightPraise for RootkitsPrefaceHistorical BackgroundTarget AudiencePrerequisitesScopeAcknowledgmentsAbout the AuthorsAbout the CoverChapter 1. Leave No TraceUnderstanding Attackers' MotivesWhat Is a Rootkit?Why Do Rootkits Exist?How Long Have Rootkits Been Around?How Do Rootkits Work?What a Rootkit Is NotRootkits and Software ExploitsOffensive Rootkit TechnologiesConclusionChapter 2. Subverting the KernelImportant Kernel ComponentsRootkit DesignIntroducing Code into the KernelBuilding the Windows Device DriverLoading and Unloading the DriverLogging the Debug StatementsFusion Rootkits: Bridging User and Kernel ModesLoading the RootkitDecompressing the .sys File from a ResourceSurviving RebootConclusionChapter 3. The Hardware ConnectionRing ZeroTables, Tables, and More TablesMemory PagesThe Memory Descriptor TablesThe Interrupt Descriptor TableThe System Service Dispatch TableThe Control RegistersMultiprocessor SystemsConclusionChapter 4. The Age-Old Art of HookingUserland HooksKernel HooksA Hybrid Hooking ApproachConclusionChapter 5. Runtime PatchingDetour PatchingJump TemplatesVariations on the MethodConclusionChapter 6. Layered DriversA Keyboard SnifferThe KLOG Rootkit: A Walk-throughFile Filter DriversConclusionChapter 7. Direct Kernel Object ManipulationDKOM Benefits and DrawbacksDetermining the Version of the Operating SystemCommunicating with the Device Driver from UserlandHiding with DKOMToken Privilege and Group Elevation with DKOMConclusionChapter 8. Hardware ManipulationWhy Hardware?Modifying the FirmwareAccessing the HardwareExample: Accessing the Keyboard ControllerHow Low Can You Go? Microcode UpdateConclusionChapter 9. Covert ChannelsRemote Command, Control, and Exfiltration of DataDisguised TCP/IP ProtocolsKernel TCP/IP Support for Your Rootkit Using TDIRaw Network ManipulationKernel TCP/IP Support for Your Rootkit Using NDISHost EmulationConclusionChapter 10. Rootkit DetectionDetecting PresenceDetecting BehaviorConclusionIndexDownload: http://micropenguin.net/files/Other/Rootkits_Subverting_the_Windows_Kernel.pdf Quote