Easy Translatoris a free language translator app for Android that comes in handy when it comes to translating documents or solving communication problems. Recommended to anyone interested in computer security.Say hello to your versatile online translator who happens to know more than 100 different languages an enables you to easily translate sentences from any language to any other language. There were plenty of new concepts for me and I found the whole thing very satisfying to read. Even so, as I said before, the book was very easy to follow. I still consider myself very much a "noob" in the area. Malware and security is a topic I have long found interesting, but only very recently started studying. although I admit, I haven't gotten around to setting up a VM to mess around with (I don't think I want to mess with any of my every-day-use-machines). The examples not only clearly illustrated the concepts the author was trying to convey, but also made me excited to try it out on my own. It was easy to understand and fun to follow along because of the wealth of start-to-finish examples that are provided. I'll cut to the chase-I really liked this book. The author even predicts that in the near future, many operating systems will contain large portions of managed code and so these sorts of rootkits will become more and more like the traditional OS deals we tend to think of when we hear the word "rootkit". This expanded my understanding of rootkits to go beyond something that was part of the OS itself and into virtual machine frameworks that becoming more and more common. This book is about rootkits that are injected into managed code. Code and ideas are provided for such things, so you can stretch your imagination on the subject.įor those of you worried about these types of threats, the last 50 pages is different kinds of protection mechanisms and where we stand as the computer community. For example, how to create your own malware api inside of the chosen runtime environment. This book will definitely ease you into the subject of the rootkit.įor those of you with a little more experience, different examples of things to do with the MCR are given. It provides a great introduction to rootkits in general and you can follow along without any kind of programming knowledge. Just like managed languages are usually good picks until you go further down to the machine level and start managing different aspects for optimizations, this book is just like that for rootkits. Replacement of a run-time library to export a modified function that gets executed by your normal application, which allows a normal export to become a backdoor'd export. Which is truly amazing, or scary depending on your perspective, that anyone who can follow this book can make a working MCR today. However, to even cut this requirement, an open-source automated framework is shown in later chapters as well. net's CLR, and Android's Dalvik.įollowing along with the authors guidance and tools, a PoC can be manually made with a tiny bit of C/C++ knowledge. The author gives hand-held examples on how to implement his technique in Java's JVM. While reading through this book, I learned that the point wasn't really to shock and awe with this type of rootkit nor to shed light on a previously unknown area of managed code, but to show how braindead simple it is to create an MCR (managed code rootkit). Syngress has been releasing amazing material that has made me follow them as closely as I do with No Starch Press. I was very excited when I received this book in my mail and set some time each day to continue reading it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |