product
3241767Rootkits and Bootkitshttps://www.gandhi.com.mx/rootkits-and-bootkits-9781593278830/phttps://gandhi.vtexassets.com/arquivos/ids/2338636/34c978a4-8db8-4a6c-9302-b1a77248b175.jpg?v=638720912450300000590819MXNNo Starch PressInStock/Ebooks/<p><em>Rootkits and Bootkits</em> will teach you how to understand and counter sophisticated, advanced threats buried deep in a machines boot process or UEFI firmware.</p><p>With the aid of numerous case studies and professional research from three of the worlds leading security experts, youll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, youll learn:</p><p> How Windows bootsincluding 32-bit, 64-bit, and UEFI modeand where to find vulnerabilities<br /> The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard<br /> Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi<br /> How to perform static and dynamic analysis using emulation and tools like Bochs and IDA Pro<br /> How to better understand the delivery stage of threats against BIOS and UEFI firmware in order to create detection capabilities<br /> How to use virtualization tools like VMware Workstation to reverse engineer bootkits and the Intel Chipsec tool to dig into forensic analysis</p><p>Cybercrime syndicates and malicious actors will continue to write ever more persistent and covert attacks, but the game is not lost. Explore the cutting edge of malware analysis with <em>Rootkits and Bootkits.</em></p><p><strong>Covers boot processes for Windows 32-bit and 64-bit operating systems.</strong></p>...3177672Rootkits and Bootkits590819https://www.gandhi.com.mx/rootkits-and-bootkits-9781593278830/phttps://gandhi.vtexassets.com/arquivos/ids/2338636/34c978a4-8db8-4a6c-9302-b1a77248b175.jpg?v=638720912450300000InStockMXN99999DIEbook20199781593278830_W3siaWQiOiJmMjUwNWJmNC1jOTMxLTQ4NjAtYWFkYS0yOTAwYmEwYTU2OWMiLCJsaXN0UHJpY2UiOjc5OSwiZGlzY291bnQiOjIyNCwic2VsbGluZ1ByaWNlIjo1NzUsImluY2x1ZGVzVGF4Ijp0cnVlLCJwcmljZVR5cGUiOiJXaG9sZXNhbGUiLCJjdXJyZW5jeSI6Ik1YTiIsImZyb20iOiIyMDI0LTEyLTAxVDAwOjAwOjAwWiIsInJlZ2lvbiI6Ik1YIiwiaXNQcmVvcmRlciI6ZmFsc2V9XQ==9781593278830_<p><em>Rootkits and Bootkits</em> will teach you how to understand and counter sophisticated, advanced threats buried deep in a machines boot process or UEFI firmware.</p><p>With the aid of numerous case studies and professional research from three of the worlds leading security experts, youll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, youll learn:</p><p> How Windows bootsincluding 32-bit, 64-bit, and UEFI modeand where to find vulnerabilities<br /> The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard<br /> Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi<br /> How to perform static and dynamic analysis using emulation and tools like Bochs and IDA Pro<br /> How to better understand the delivery stage of threats against BIOS and UEFI firmware in order to create detection capabilities<br /> How to use virtualization tools like VMware Workstation to reverse engineer bootkits and the Intel Chipsec tool to dig into forensic analysis</p><p>Cybercrime syndicates and malicious actors will continue to write ever more persistent and covert attacks, but the game is not lost. Explore the cutting edge of malware analysis with <em>Rootkits and Bootkits.</em></p><p><strong>Covers boot processes for Windows 32-bit and 64-bit operating systems.</strong></p>(*_*)9781593278830_<p><em>Rootkits and Bootkits</em> will teach you how to understand and counter sophisticated, advanced threats buried deep in a machines boot process or UEFI firmware.</p><p>With the aid of numerous case studies and professional research from three of the worlds leading security experts, youll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, youll learn:</p><p> How Windows bootsincluding 32-bit, 64-bit, and UEFI modeand where to find vulnerabilities<br /> The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard<br /> Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi<br /> How to perform static and dynamic analysis using emulation and tools like Bochs and IDA Pro<br /> How to better understand the delivery stage of threats against BIOS and UEFI firmware in order to create detection capabilities<br /> How to use virtualization tools like VMware Workstation to reverse engineer bootkits and the Intel Chipsec tool to dig into forensic analysis</p><p>Cybercrime syndicates and malicious actors will continue to write ever more persistent and covert attacks, but the game is not lost. Explore the cutting edge of malware analysis with <em>Rootkits and Bootkits.</em></p><p><strong>Covers boot processes for Windows 32-bit and 64-bit operating systems.</strong></p>...9781593278830_No Starch Presslibro_electonico_fb15c1bc-1b85-3c22-90b0-bbf508f8d05c_9781593278830;9781593278830_9781593278830Sergey BratusInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/randomhousewh-epub-b95a18f1-6f16-4db4-906a-705ddbea5a48.epub2019-05-07T00:00:00+00:00No Starch Press