Imagine being able to change the languages for the
applicationsthat a computer is running and taking control over it.
That is exactly what managed code rootkits can do when they are
placed within a computer. This new type of rootkit is hiding in a
place that had previously been safe from this type of attack-the
application level. Code reviews do not currently look for back
doors in the virtual machine (VM) where this new rootkit would be
injected. An invasion of this magnitude allows an attacker to steal
information on the infected computer, provide false information,
and disable security checks.Erez Metula shows the reader how these
rootkits are developed and inserted and how this attack can change
the managed codethat a computeris running, whether that be JAVA,
.NET, Android Dalvik or any other managed code. Management
development scenarios, tools like ReFrameworker, and
countermeasures are covered, makingthis book a one stop shop for
this new attack vector.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec
Reviews"Introduces the reader briefly to managed code environments
and rootkits in generalCompletely details a new type of rootkit
hiding in the application level and demonstrates how a hacker can
change language runtime implementationFocuses on managed code
including Java, .NET, Android Dalvik and reviews malware
development scanarios"
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!