Skip to Main Content
Rootkits: Subverting the Windows Kernel
book

Rootkits: Subverting the Windows Kernel

by Greg Hoglund, James Butler
July 2005
Intermediate to advanced content levelIntermediate to advanced
352 pages
7h 18m
English
Addison-Wesley Professional
Content preview from Rootkits: Subverting the Windows Kernel

Chapter 8. Hardware Manipulation

 

Throughout your life, advance daily, becoming more skillful than yesterday, more skillful than today. This is never-ending.

 
 --HAGAKURE

A scenario:

The intruder slips along the wall toward a janitor cart resting at the end of the hall. His eyes are on a set of keys. A quick look around the corner; good, the janitor is down the hall cleaning a doctor’s office. The intruder gently lifts the key chain and dashes back into the dark hallway. Around a corner, stopping at a door, he tries the lock. This doesn’t take long. Once the door is open, he sneaks back to the cart and replaces the keys.

The office is dark except for a computer terminal in the back. After moving the monitor and keyboard to the floor, he sits in the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Rootkits and Bootkits

Rootkits and Bootkits

Alex Matrosov, Eugene Rodionov, Sergey Bratus
The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

Joxean Koret, Elias Bachaalany

Publisher Resources

ISBN: 0321294319Purchase book