Information of news
 (Votes #: 0)

Rootkits: What they are, and how to find them videos , samples , labs and slides

Category: Tutorial

Download Now

Rootkits: What they are, and how to find them videos , samples , labs and slides

Rootkits: What they are, and how to find them videos , samples , labs and slides

English | Size: 5.57 GB (5,981,797,995 Bytes)
Category: Tutorial

lass Prerequisites: You are recommended, but not required, to have taken Introduction to x86, Intermediate x86, and Life of Binaries.
Lab Requirements: Requires a Windows XP virtual machine. Rootkits are installed into the machine per the instructions in the TiddlyWiki class materials.

Class Textbook: "The Rootkits Arsenal" by Bill Blunden. (All page references in the class material are currently for the 1st edition book, the 2nd edition is not recommended.) This book was chosen because it contains the broadest coverage of rootkit topics. "Rootkits: Subverting the Windows Kernel" is good as well, but getting a bit dated. Recommended, but not required, is Windows Internals 6th edition, Part 1 and Part 2. This provides a large amount of detail on Windows' internals, of which rootkit-relevant components are a small part. But the books can provide additional information that people interested in deep system security may be interested in.

Recommended Class Duration: 2 days

Creator Available to Teach In-Person Classes: Yes

Author Comments:

Introductory Intel x86, Intermediate Intel x86, and Life of Binaries are strongly recommended to be taken before of this class.

Rootkits are a class of malware which are dedicated to hiding the attacker's presence on a compromised system. This class will focus on understanding how rootkits work, and what tools can be used to help find them.

This will be a very hands-on class where we talk about specific techniques which rootkits use, and then do labs where we show how a proof of concept rootkit is able to hide things from a defender. Example techniques include

*Trojaned binaries

*Inline hooks

*Import Address Table (IAT) hooking

*System Call Table/System Service Descriptor Table (SSDT) hooking

*Interrupt Descriptor Table (IDT) hooking

*Direct Kernel Object Manipulation (DKOM)

*Kernel Object Hooking (KOH)

*IO Request Packet (IRP) filtering

*Hiding files/processes/open ports

*Compromising the Master Boot Record (MBR) to install a "bootkit"

The class will help the student learn which tools to use to look for rootkits on Windows systems, how to evaluate the breadth of a tool's detection capabilities, and how to interpret tool results.

This class is structured so that students are given a homework to detect rootkits *before* they have taken the class. This homework is given in the context of the following scenario:

"You, being the only ‘security person' in the area, have been called in to

examine a running Windows server because "it's acting funny." They don't

care that you like Mac/Linux/BSD/Plan9 better, you need to look at it! You

are solemnly informed that this is system is mission critical and can only

be rebooted if absolutely necessary. You must investigate whether any sort

of compromise has taken place on the system, with minimal impact to the

mission. What do you do? What DO you DO?"

The homework is then for the student to use any means at their disposal to write up answers to the following questions: "What malicious changes were made to the system?", "What tools did you use to detect the changes?", "How can you remove the changes?". The students' answers are then anonymized and shared with the rest of the class afterwards, so that they can see how others approached the problem, and learn from their techniques. The anonymization of the homework before distribution is important so that students know that even though they don't know, and aren't expected to know, anything about the area yet, their entry will not be judged by other students.

A student Q&A forum has been set up at http://www.reddit.com/r/OST_Rootkits.
DOWNLOAD LINKS:
Buy Premium To Support Me & Get Resumable Support & Max Speed

Uploaded.net:
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part01.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part02.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part03.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part04.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part05.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part06.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part07.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part08.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part09.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part10.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part11.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part12.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part13.rar

Rapidgator.net:
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part01.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part02.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part03.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part04.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part05.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part06.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part07.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part08.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part09.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part10.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part11.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part12.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part13.rar.html

UploadRocket.net:
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part01.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part02.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part03.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part04.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part05.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part06.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part07.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part08.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part09.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part10.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part11.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part12.rar.html
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part13.rar.html

OBoom.com:
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part01.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part02.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part03.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part04.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part05.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part06.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part07.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part08.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part09.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part10.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part11.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part12.rar
km1g8.R.W.t.a.a.h.t.f.t.v.s.l.a.s.part13.rar

Links are Interchangeable - No Password - Single Extraction
Direct Download


Tags: Rootkits, videos, samples, slides


Rootkits: What they are, and how to find them videos , samples , labs and slides Fast Download via Rapidshare Hotfile Fileserve Filesonic Megaupload, Rootkits: What they are, and how to find them videos , samples , labs and slides Torrents and Emule Download or anything related.
Dear visitor, you went to website as unregistered user.
We encourage you to Register or Login to website under your name.

Add comments

Name:*
E-Mail:*
Comments:
Enter Code: *