LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game
Home » Ebooks & Tutorials » Technical » Internet & Networking » Rootkits What they are, and how to find them videos , samples , labs and slides

Rootkits What they are, and how to find them videos , samples , labs and slides

12/12/2015 Learning for Life Leave a Comment

Rootkits: What they are, and how to find them videos , samples , labs and slides

English | Size: 5.57 GB (5,981,797,995 Bytes)
Category: Tutorial


lass Prerequisites: You are recommended, but not required, to have taken Introduction to x86, Intermediate x86, and Life of Binaries.

Lab Requirements: Requires a Windows XP virtual machine. Rootkits are installed into the machine per the instructions in the TiddlyWiki class materials.

Class Textbook: “The Rootkits Arsenal” by Bill Blunden. (All page references in the class material are currently for the 1st edition book, the 2nd edition is not recommended.) This book was chosen because it contains the broadest coverage of rootkit topics. “Rootkits: Subverting the Windows Kernel” is good as well, but getting a bit dated. Recommended, but not required, is Windows Internals 6th edition, Part 1 and Part 2. This provides a large amount of detail on Windows’ internals, of which rootkit-relevant components are a small part. But the books can provide additional information that people interested in deep system security may be interested in.

Recommended Class Duration: 2 days

Creator Available to Teach In-Person Classes: Yes

Author Comments:

Introductory Intel x86, Intermediate Intel x86, and Life of Binaries are strongly recommended to be taken before of this class.

Rootkits are a class of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and what tools can be used to help find them.

This will be a very hands-on class where we talk about specific techniques which rootkits use, and then do labs where we show how a proof of concept rootkit is able to hide things from a defender. Example techniques include

•Trojaned binaries

•Inline hooks

•Import Address Table (IAT) hooking

•System Call Table/System Service Descriptor Table (SSDT) hooking

•Interrupt Descriptor Table (IDT) hooking

•Direct Kernel Object Manipulation (DKOM)

•Kernel Object Hooking (KOH)

•IO Request Packet (IRP) filtering

•Hiding files/processes/open ports

•Compromising the Master Boot Record (MBR) to install a “bootkit”

The class will help the student learn which tools to use to look for rootkits on Windows systems, how to evaluate the breadth of a tool’s detection capabilities, and how to interpret tool results.

This class is structured so that students are given a homework to detect rootkits *before* they have taken the class. This homework is given in the context of the following scenario:

“You, being the only ‘security person’ in the area, have been called in to

examine a running Windows server because “it’s acting funny.” They don’t

care that you like Mac/Linux/BSD/Plan9 better, you need to look at it! You

are solemnly informed that this is system is mission critical and can only

be rebooted if absolutely necessary. You must investigate whether any sort

of compromise has taken place on the system, with minimal impact to the

mission. What do you do? What DO you DO?”

The homework is then for the student to use any means at their disposal to write up answers to the following questions: “What malicious changes were made to the system?”, “What tools did you use to detect the changes?”, “How can you remove the changes?”. The students’ answers are then anonymized and shared with the rest of the class afterwards, so that they can see how others approached the problem, and learn from their techniques. The anonymization of the homework before distribution is important so that students know that even though they don’t know, and aren’t expected to know, anything about the area yet, their entry will not be judged by other students.

A student Q&A forum has been set up at http://www.reddit.com/r/OST_Rootkits.

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:


http://rapidgator.net/file/c4df6a307dc0b0bbf274eac6b325965e/RootKits_,_What_they_are_,_and_how_to_find_them.part01.rar.html
http://rapidgator.net/file/bd9704c53f3ecc4c35b577caaf0ea8b1/RootKits_,_What_they_are_,_and_how_to_find_them.part02.rar.html
http://rapidgator.net/file/387d0d3198f7992c0415f37149f2e067/RootKits_,_What_they_are_,_and_how_to_find_them.part03.rar.html
http://rapidgator.net/file/dd3e41e5d8b1be4bea6aa8c046e5f342/RootKits_,_What_they_are_,_and_how_to_find_them.part04.rar.html
http://rapidgator.net/file/99d23070b96812bc8d40941a3544007e/RootKits_,_What_they_are_,_and_how_to_find_them.part05.rar.html
http://rapidgator.net/file/a0cfc0a5277dc17fd88108ec1bbd93ea/RootKits_,_What_they_are_,_and_how_to_find_them.part06.rar.html
http://rapidgator.net/file/8ad102174d0e2e019b7aa5b5c8defd6d/RootKits_,_What_they_are_,_and_how_to_find_them.part07.rar.html
http://rapidgator.net/file/88764bc774db2a06b6030c47c47bc0a9/RootKits_,_What_they_are_,_and_how_to_find_them.part08.rar.html
http://rapidgator.net/file/9170f9dfb50ec5e2e1563b869a5b6abb/RootKits_,_What_they_are_,_and_how_to_find_them.part09.rar.html
http://rapidgator.net/file/40a2a2da596bb94a31240ee9a2b1c4e6/RootKits_,_What_they_are_,_and_how_to_find_them.part10.rar.html
http://rapidgator.net/file/53a445b3183fc09dc76b09843338d9b6/RootKits_,_What_they_are_,_and_how_to_find_them.part11.rar.html
http://rapidgator.net/file/176c3d55d72d5d07d2e3ad8867550ac6/RootKits_,_What_they_are_,_and_how_to_find_them.part12.rar.html
http://rapidgator.net/file/7bdeca35a00437113e1f4cc70df2a52e/RootKits_,_What_they_are_,_and_how_to_find_them.part13.rar.html


http://www.nitroflare.com/view/E62A2D4D6CD7540/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part01.rar
http://www.nitroflare.com/view/355A73F3D06028F/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part02.rar
http://www.nitroflare.com/view/064BA56371E5983/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part03.rar
http://www.nitroflare.com/view/14262FA2040FDFF/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part04.rar
http://www.nitroflare.com/view/7017075DC97BE2D/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part05.rar
http://www.nitroflare.com/view/B960F23F1DAD9DE/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part06.rar
http://www.nitroflare.com/view/50370FDC7F30FFF/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part07.rar
http://www.nitroflare.com/view/6EEA92EF24CED57/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part08.rar
http://www.nitroflare.com/view/0F29AA8115C6973/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part09.rar
http://www.nitroflare.com/view/4009787855A643C/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part10.rar
http://www.nitroflare.com/view/073A79BA3AE3025/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part11.rar
http://www.nitroflare.com/view/E438DDBAA6BF6FA/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part12.rar
http://www.nitroflare.com/view/8CFA4536E886EB2/RootKits_%2C_What_they_are_%2C_and_how_to_find_them.part13.rar

If any links die or problem unrar, send request to http://goo.gl/aUHSZc

Internet & Networking how to find them, Rootkits, samples, Videos, What they are

← Reverse Engineering Malware Saveur 2006-2015 [82 PDF] →

About Learning for Life

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Ch4 NASA Nazis and the Space Race
  • Udemy – Machine Learning based APIs using Nest.js
  • Academy of Animated Art – Arnold For Maya Workshop
  • WordPress Speed Optimization & Google Core Web Vitals 2024 | Udemy
  • Udemy – CISSP ISSAP MASTERCLASS 2025 COURSE WITH PRACTICE QUESTIONS

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in