July 2005
Intermediate to advanced
352 pages
7h 18m
English
Generally in war the best policy is to take a state intact; to ruin it is inferior to this. | ||
| --SUN TZU | ||
In the preceding chapters, we covered a great deal about hooking techniques. Hooking the operating system is a very effective process, especially since you cannot compile your rootkit into the manufacturer’s distribution. In certain instances, hooking is the only method available to a rootkit programmer.
However, as we saw in earlier chapters, hooking has its drawbacks. If someone knows where to look, a hook can usually be detected. In fact, it is relatively easy to detect hooking. In Chapter 10, Rootkit Detection, we will cover how to detect hooks, and you will learn about a tool called VICE that does ...