Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The rootkit arsenal : escape and evasion in the dark corners of the system
Blunden B., Jones and Bartlett Publishers, Inc., Plano, TX, 2009. 908 pp. Type: Book (9781598220612)
Date Reviewed: Oct 1 2009

This book addresses a controversial and timely issue in the field of network security. Rootkits are notoriously used by the black hat hacking community. A rootkit allows an attacker to subvert a compromised system. This subversion can take place at the application level, as is the case for the early rootkits that replaced a set of common administrative tools, but can be more dangerous when it occurs at the kernel level. A rootkit hides the network traffic, processes, and files that an attacker decides to keep invisible to administrators and system management tools.

Blunden provides complete and detailed coverage of kernel-level rootkits for the Windows operating system (OS). Part 1 begins with three chapters on the IA-32 architecture and the Windows OS. The scope is very broad, starting with the well-known flat memory/segmented memory layout, and ending with an updated description of the booting process and underlying architecture. Chapter 4, on the first rootkit, uses an example to show how the writing and debugging of a complete rootkit is done. (Subsequent chapters present the kernel-specific structures that can be subverted.)

Part 2 begins with chapter 5, “Hooking Call Tables.” Chapter 6 shows different code detouring techniques, and chapter 7 is dedicated to the manipulation of the EPROCESS kernel structure. This part is relatively self-contained--although Blunden provides background material on the Windows-specific architecture, there is a steep learning curve to understand and follow these chapters. Once they are mastered, astute readers will know the different possibilities for hiding malicious code in a running system. Part 2 ends with chapter 8, “Deploying Filter Drivers.”

Part 3 consists of chapters 9 to 12, which address the subverting of file system data and network analysis. I appreciate the material on foiling runtime executable analysis by defeating both kernel-level and user-mode debuggers. Also, this section nicely covers network driver interface specification (NDIS) drivers and domain name system (DNS) tunneling.

Part 4 covers practical, hands-on rootkit development. Chapter 13 presents a list of 11 rootkit-related projects. Part 4 ends with chapter 14, “Closing Thoughts.”

Example code from real rootkits is provided in each chapter, and the information presented is extensive and up to date. While the book can be read from cover to cover, readers can also pick and choose specific chapters. The book’s size and technical content is impressive. At more than 800 pages, it is a difficult but rewarding read. Since the book is very technical, readers must have a strong background in IA-32 architectures and system-level programming. If you work on defensive solutions--anti-virus and malware detection tools--or are interested in low-level system programming, you must read this book. In fact, for the intended audience, this is one of the best books of 2009.

The world of rootkits is a difficult one, requiring great software and system programming skills. Motivated readers will learn the essentials from this outstanding reference book.

Reviewer:  Radu State Review #: CR137337 (1009-0856)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy