°£Æí°áÁ¦, ½Å¿ëÄ«µå û±¸ÇÒÀÎ
ÀÎÅÍÆÄÅ© ·Ôµ¥Ä«µå 5% (37,050¿ø)
(ÃÖ´ëÇÒÀÎ 10¸¸¿ø / Àü¿ù½ÇÀû 40¸¸¿ø)
ºÏÇǴϾð ·Ôµ¥Ä«µå 30% (27,300¿ø)
(ÃÖ´ëÇÒÀÎ 3¸¸¿ø / 3¸¸¿ø ÀÌ»ó °áÁ¦)
NH¼îÇÎ&ÀÎÅÍÆÄÅ©Ä«µå 20% (31,200¿ø)
(ÃÖ´ëÇÒÀÎ 4¸¸¿ø / 2¸¸¿ø ÀÌ»ó °áÁ¦)
Close

Rootkits

¼Òµæ°øÁ¦

2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.

°øÀ¯Çϱâ
Á¤°¡

39,000¿ø

  • 39,000¿ø

    1,170P (3%Àû¸³)

ÇÒÀÎÇýÅÃ
Àû¸³ÇýÅÃ
  • S-Point Àû¸³Àº ¸¶ÀÌÆäÀÌÁö¿¡¼­ Á÷Á¢ ±¸¸ÅÈ®Á¤ÇϽŠ°æ¿ì¸¸ Àû¸³ µË´Ï´Ù.
Ãß°¡ÇýÅÃ
¹è¼ÛÁ¤º¸
  • 4/20(Åä) À̳» ¹ß¼Û ¿¹Á¤  (¼­¿ï½Ã °­³²±¸ »ï¼º·Î 512)
  • ¹«·á¹è¼Û
ÁÖ¹®¼ö·®
°¨¼Ò Áõ°¡
  • À̺¥Æ®/±âȹÀü

  • ¿¬°üµµ¼­

  • »óÇ°±Ç

AD

¸ñÂ÷

Prefacep. xv
Acknowledgmentsp. xix
About the Authorsp. xxi
About the Coverp. xxiii
Leave No Tracep. 1
Understanding Attackers' Motivesp. 2
The Role of Stealthp. 2
When Stealth Doesn't Matterp. 3
What Is a Rootkit?p. 4
Why Do Rootkits Exist?p. 4
Remote Command and Controlp. 5
Software Eavesdroppingp. 5
Legitimate Uses of Rootkitsp. 6
How Long Have Rootkits Been Around?p. 7
How Do Rootkits Work?p. 8
Patchingp. 8
Easter Eggsp. 9
Spyware Modificationsp. 9
Source-Code Modificationp. 9
The Legality of Software Modificationp. 10
What a Rootkit Is Notp. 10
A Rootkit Is Not an Exploitp. 11
A Rootkit Is Not a Virusp. 11
Rootkits and Software Exploitsp. 13
Why Exploits Are Still a Problemp. 15
Offensive Rootkit Technologiesp. 17
HIPSp. 17
NIDSp. 17
Bypassing the IDS/IPSp. 18
Bypassing Forensic Toolsp. 18
Conclusionp. 20
Subverting the Kernelp. 21
Important Kernel Componentsp. 22
Rootkit Designp. 23
Introducing Code into the Kernelp. 25
Building the Windows Device Driverp. 26
The Device Driver Development Kitp. 27
The Build Environmentsp. 27
The Filesp. 27
Running the Build Utilityp. 29
The Unload Routinep. 30
Loading and Unloading the Driverp. 30
Logging the Debug Statementsp. 31
Fusion Rootkits: Bridging User and Kernel Modesp. 32
I/O Request Packetsp. 33
Creating a File Handlep. 37
Adding a Symbolic Linkp. 38
Loading the Rootkitp. 39
The Quick-and-Dirty Way to Load a Driverp. 40
The Right Way to Load a Driverp. 41
Decompressing the .sys File from a Resourcep. 43
Surviving Rebootp. 46
Conclusionp. 47
The Hardware Connectionp. 49
Ring Zerop. 50
Tables, Tables, and More Tablesp. 52
Memory Pagesp. 53
Memory Access Check Detailsp. 53
Paging and Address Translationp. 55
Page-Table Lookupsp. 56
The Page-Directory Entryp. 58
The Page-Table Entryp. 59
Read-Only Access to Some Important Tablesp. 59
Multiple Processes, Multiple Page Directoriesp. 59
Processes and Threadsp. 60
The Memory Descriptor Tablesp. 61
The Global Descriptor Tablep. 61
The Local Descriptor Tablep. 62
Code Segmentsp. 62
Call Gatesp. 62
The Interrupt Descriptor Tablep. 62
Other Types of Gatesp. 65
The System Service Dispatch Tablep. 66
The Control Registersp. 66
Control Register Zero (CR0)p. 66
Other Control Registersp. 67
The EFlags Registerp. 67
Multiprocessor Systemsp. 68
Conclusionp. 69
The Age-Old Art of Hookingp. 71
Userland Hooksp. 71
Import Address Table Hookingp. 73
Inline Function Hookingp. 74
Injecting a DLL into Userland Processesp. 76
Kernel Hooksp. 81
Hooking the System Service Descriptor Tablep. 82
Hooking the Interrupt Descriptor Tablep. 91
Hooking the Major I/O Request Packet Function Table in the Device Driver Objectp. 96
A Hybrid Hooking Approachp. 106
Getting into a Process' Address Spacep. 106
Memory Space for Hooksp. 111
Conclusionp. 112
Runtime Patchingp. 113
Detour Patchingp. 114
Rerouting the Control Flow Using MigBotp. 115
Checking for Function Bytesp. 117
Keeping Track of the Overwritten Instructionsp. 118
Using NonPagedPool Memoryp. 121
Runtime Address Fixupsp. 121
Jump Templatesp. 125
The Interrupt Hook Examplep. 126
Variations on the Methodp. 133
Conclusionp. 133
Layered Driversp. 135
A Keyboard Snifferp. 136
I/O Request Packet (IRP) and Stack Locationsp. 137
The KLOG Rootkit: A Walk-throughp. 140
File Filter Driversp. 153
Conclusionp. 167
Direct Kernel Object Manipulationp. 169
DKOM Benefits and Drawbacksp. 169
Determining the Version of the Operating Systemp. 171
User-Mode Self-Determinationp. 171
Kernel-Mode Self-Determinationp. 173
Querying the Operating System Version in the Registryp. 174
Communicating with the Device Driver from Userlandp. 175
Hiding with DKOMp. 179
Process Hidingp. 180
Device-Driver Hidingp. 185
Synchronization Issuesp. 189
Token Privilege and Group Elevation with DKOMp. 193
Modifying a Process Tokenp. 194
Faking out the Windows Event Viewerp. 208
Conclusionp. 210
Hardware Manipulationp. 213
Why Hardware?p. 215
Modifying the Firmwarep. 216
Accessing the Hardwarep. 217
Hardware Addressesp. 217
Accessing Hardware Is Not Like Accessing RAMp. 218
Timing Considerationsp. 219
The I/O Busp. 219
Accessing the BIOSp. 221
Accessing PCI and PCMCIA Devicesp. 221
Example: Accessing the Keyboard Controllerp. 222
The 8259 Keyboard Controllerp. 222
Changing the LED Indicatorsp. 222
Hard Rebootp. 229
Keystroke Monitorp. 229
How Low Can You Go? Microcode Updatep. 236
Conclusionp. 237
Covert Channelsp. 239
Remote Command, Control, and Exfiltration of Datap. 240
Disguised TCP/IP Protocolsp. 241
Beware of Traffic Patternsp. 242
Don't Send Data "in the Clear"p. 242
Use Time to Your Advantagep. 243
Hide Under DNS Requestsp. 243
"Stego" on ASCII Payloadsp. 244
Use Other TCP/IP Channelsp. 245
Kernel TCP/IP Support for Your Rootkit Using TDIp. 246
Build the Address Structurep. 246
Create a Local Address Objectp. 248
Create a TDI Endpoint with Contextp. 252
Associate an Endpoint with a Local Addressp. 254
Connect to a Remote Server (Send the TCP Handshake)p. 257
Send Data to a Remote Serverp. 259
Raw Network Manipulationp. 262
Implementing Raw Sockets on Windows XPp. 262
Binding to an Interfacep. 263
Sniffing with Raw Socketsp. 264
Promiscuous Sniffing with Raw Socketsp. 264
Sending Packets with Raw Socketsp. 265
Forging the Sourcep. 266
Bouncing Packetsp. 266
Kernel TCP/IP Support for Your Rootkit Using NDISp. 267
Registering the Protocolp. 267
The Protocol Driver Callbacksp. 273
Moving Whole Packetsp. 278
Host Emulationp. 285
Creating Your MAC Addressp. 286
Handling ARPp. 286
The IP Gatewayp. 289
Sending a Packetp. 289
Conclusionp. 293
Rootkit Detectionp. 295
Detecting Presencep. 295
Guarding the Doorsp. 296
Scanning the "Rooms"p. 298
Looking for Hooksp. 298
Detecting Behaviorp. 308
Detecting Hidden Files and Registry Keysp. 308
Detecting Hidden Processesp. 309
Conclusionp. 312
Indexp. 315
Table of Contents provided by Ingram. All Rights Reserved.

Ã¥¼Ò°³

Rootkit.com founder reveals never-before-told offensive aspects of rootkit technology.

ÀúÀÚ¼Ò°³

Hoglund, Greg/ Butler, James [Àú] ½ÅÀ۾˸² SMS½Åû
»ý³â¿ùÀÏ -

ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.

ÄÄÇ»ÅÍ ºÐ¾ß¿¡¼­ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥

    ¸®ºä

    0.0 (ÃÑ 0°Ç)

    100ÀÚÆò

    ÀÛ¼º½Ã À¯ÀÇ»çÇ×

    ÆòÁ¡
    0/100ÀÚ
    µî·ÏÇϱâ

    100ÀÚÆò

    0.0
    (ÃÑ 0°Ç)

    ÆǸÅÀÚÁ¤º¸

    • ÀÎÅÍÆÄÅ©µµ¼­¿¡ µî·ÏµÈ ¿ÀǸ¶ÄÏ »óÇ°Àº ±× ³»¿ë°ú Ã¥ÀÓÀÌ ¸ðµÎ ÆǸÅÀÚ¿¡°Ô ÀÖÀ¸¸ç, ÀÎÅÍÆÄÅ©µµ¼­´Â ÇØ´ç »óÇ°°ú ³»¿ë¿¡ ´ëÇØ Ã¥ÀÓÁöÁö ¾Ê½À´Ï´Ù.

    »óÈ£

    (ÁÖ)±³º¸¹®°í

    ´ëÇ¥ÀÚ¸í

    ¾Èº´Çö

    »ç¾÷ÀÚµî·Ï¹øÈ£

    102-81-11670

    ¿¬¶ôó

    1544-1900

    ÀüÀÚ¿ìÆíÁÖ¼Ò

    callcenter@kyobobook.co.kr

    Åë½ÅÆǸž÷½Å°í¹øÈ£

    01-0653

    ¿µ¾÷¼ÒÀçÁö

    ¼­¿ïƯº°½Ã Á¾·Î±¸ Á¾·Î 1(Á¾·Î1°¡,±³º¸ºôµù)

    ±³È¯/ȯºÒ

    ¹ÝÇ°/±³È¯ ¹æ¹ý

    ¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹ÝÇ°/±³È¯/ȯºÒ¡¯ ¿¡¼­ ½Åû ¶Ç´Â 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¹× °í°´¼¾ÅÍ(1577-2555)¿¡¼­ ½Åû °¡´É

    ¹ÝÇ°/±³È¯°¡´É ±â°£

    º¯½É ¹ÝÇ°ÀÇ °æ¿ì Ãâ°í¿Ï·á ÈÄ 6ÀÏ(¿µ¾÷ÀÏ ±âÁØ) À̳»±îÁö¸¸ °¡´É
    ´Ü, »óÇ°ÀÇ °áÇÔ ¹× °è¾à³»¿ë°ú ´Ù¸¦ °æ¿ì ¹®Á¦Á¡ ¹ß°ß ÈÄ 30ÀÏ À̳»

    ¹ÝÇ°/±³È¯ ºñ¿ë

    º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹ÝÇ°/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã
    »óÇ°À̳ª ¼­ºñ½º ÀÚüÀÇ ÇÏÀÚ·Î ÀÎÇÑ ±³È¯/¹ÝÇ°Àº ¹Ý¼Û·á ÆǸÅÀÚ ºÎ´ã

    ¹ÝÇ°/±³È¯ ºÒ°¡ »çÀ¯

    ·¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì
    (´ÜÁö È®ÀÎÀ» À§ÇÑ Æ÷Àå ÈѼÕÀº Á¦¿Ü)

    ·¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óÇ° µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
    ¿¹) È­ÀåÇ°, ½ÄÇ°, °¡ÀüÁ¦Ç°(¾Ç¼¼¼­¸® Æ÷ÇÔ) µî

    ·º¹Á¦°¡ °¡´ÉÇÑ »óÇ° µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì
    ¿¹) À½¹Ý/DVD/ºñµð¿À, ¼ÒÇÁÆ®¿þ¾î, ¸¸È­Ã¥, ÀâÁö, ¿µ»ó È­º¸Áý

    ·½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆǸŰ¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì

    ·ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì

    »óÇ° Ç°Àý

    °ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ Ç°Àý/Áö¿¬µÉ ¼ö ÀÖÀ½

    ¼ÒºñÀÚ ÇÇÇغ¸»ó
    ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó

    ·»óÇ°ÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, Ç°Áúº¸Áõ ¹× ÇÇÇغ¸»ó µî¿¡ °üÇÑ »çÇ×Àº ¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ ÁØÇÏ¿© 󸮵Ê

    ·´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ

    (ÁÖ)KGÀ̴Ͻýº ±¸¸Å¾ÈÀü¼­ºñ½º¼­ºñ½º °¡ÀÔ»ç½Ç È®ÀÎ

    (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º´Â ȸ¿ø´ÔµéÀÇ ¾ÈÀü°Å·¡¸¦ À§ÇØ ±¸¸Å±Ý¾×, °áÁ¦¼ö´Ü¿¡ »ó°ü¾øÀÌ (ÁÖ)ÀÎÅÍÆÄÅ©Ä¿¸Ó½º¸¦ ÅëÇÑ ¸ðµç °Å·¡¿¡ ´ëÇÏ¿©
    (ÁÖ)KGÀ̴Ͻýº°¡ Á¦°øÇÏ´Â ±¸¸Å¾ÈÀü¼­ºñ½º¸¦ Àû¿ëÇÏ°í ÀÖ½À´Ï´Ù.

    ¹è¼Û¾È³»

    • ±³º¸¹®°í »óÇ°Àº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óÇ°À» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.

    • Ãâ°í°¡´É ½Ã°£ÀÌ ¼­·Î ´Ù¸¥ »óÇ°À» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óÇ°À» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.

    • ±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÕ´Ï´Ù.

    • ¹è¼Ûºñ´Â ¾÷ü ¹è¼Ûºñ Á¤Ã¥¿¡ µû¸¨´Ï´Ù.

    • - µµ¼­ ±¸¸Å ½Ã 15,000¿ø ÀÌ»ó ¹«·á¹è¼Û, 15,000¿ø ¹Ì¸¸ 2,500¿ø - »óÇ°º° ¹è¼Ûºñ°¡ ÀÖ´Â °æ¿ì, »óÇ°º° ¹è¼Ûºñ Á¤Ã¥ Àû¿ë