Goodreads helps you keep track of books you want to read.
Start by marking “The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System” as Want to Read:
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Enlarge cover
Rate this book
Clear rating
Open Preview

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

4.07  ·  Rating Details ·  82 Ratings  ·  5 Reviews
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the mo ...more
Paperback, 2nd edition, 781 pages
Published March 16th 2012 by Jones & Bartlett Publishers (first published May 4th 2009)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about The Rootkit Arsenal, please sign up.

Be the first to ask a question about The Rootkit Arsenal

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
Andre
Mar 03, 2012 Andre rated it it was amazing  ·  review of another edition
"The Way that can be described is not the true Way." -Lao Tse

I like books that have quotes sprinkled throughout it. It's almost like finding dollar bills in your couch. And I like the fact that, at the end of the book, he compares subversion tactics of rootkits to subversion tactics of nations against their people (an interesting note: the publisher of the book removed the "final last chapter" from the 2nd edition, but he put it on his web site).

This could be the absolute BEST book on programmin
...more
B
Jan 18, 2014 B rated it it was amazing  ·  review of another edition
Reviews on Reverend Bill's choice of good vs. bad overlook the need to grasp "that concept". While technical--throw it to any CFO to justify costs, CTO that they don't know it all, Security "guru" there's always someone better. I've been in circles where they spoke of the book like it should be banned--others..the bible. Ignorance and FUD are the enemy. Pull the security blanket over our heads, sing praise to the almighty vendor selling us products that protect us because that's what we want to ...more
Kenneth Miller
Can difficult to follow along with if you don't have a duplicate setup of the author. A great book that teaches how rootkits are authored and constructed but like any technology, isn't truly ingrained until applied.
Wolfgang Barthel
Sometimes the author gets too much into that good guy bad guy talking of hackers. Nonetheless is the information about rootkits shown in the book one of the bests i've read.
Yannick Daffaud
Yannick Daffaud rated it it was amazing
Apr 27, 2012
Andrew Douma
Andrew Douma rated it it was amazing
Jun 26, 2016
Tanuki
Tanuki rated it it was amazing
Nov 04, 2014
Michael Rusk
Michael Rusk rated it it was amazing
Sep 26, 2014
Tim Crothers
Tim Crothers rated it it was amazing
Apr 27, 2016
MD
MD rated it liked it
Nov 21, 2015
Richard Landsberg
Richard Landsberg rated it it was amazing
Jul 22, 2014
Michael Ahrendt
Michael Ahrendt rated it really liked it
Jul 13, 2016
Deimen
Deimen rated it really liked it
May 10, 2016
Astera
Astera rated it liked it
Nov 25, 2012
Jeremy Cooke
Jeremy Cooke rated it liked it
Nov 27, 2016
Wilhelm Bogner
Wilhelm Bogner rated it liked it
Mar 02, 2015
Ján Trenčanský
Ján Trenčanský rated it really liked it
May 26, 2015
Randall Thomas
Randall Thomas rated it really liked it
May 23, 2014
Lejulien74
Lejulien74 rated it it was amazing
Apr 01, 2016
Peadar O'maoileoin
Peadar O'maoileoin rated it it was amazing
May 11, 2014
Karanpreet Singh
Karanpreet Singh rated it it was amazing
May 31, 2016
Alberto Rojas
Alberto Rojas rated it really liked it
Oct 28, 2013
Lord
Lord rated it liked it
Oct 18, 2011
Michael Pearce
Michael Pearce rated it really liked it
Nov 08, 2012
Lockout
Lockout rated it it was amazing
Mar 02, 2016
Peter Klemperer
Peter Klemperer rated it it was amazing
Aug 22, 2016
Justin
Justin rated it really liked it
Feb 02, 2016
Daniel Philpott
Daniel Philpott rated it it was ok
Oct 02, 2015
Jitesh
Jitesh rated it really liked it
Jun 13, 2016
« previous 1 3 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Reversing: Secrets of Reverse Engineering
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • Metasploit: The Penetration Tester's Guide
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security)
  • Windows® Internals (PRO-Developer)
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Cryptography Engineering: Design Principles and Practical Applications
  • Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • File System Forensic Analysis
  • Security Engineering: A Guide to Building Dependable Distributed Systems

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book