Managed Code Rootkits: Hooking into Runtime Environments


Imagine being able to change the languages for the applicationsthat a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Continue reading “Managed Code Rootkits: Hooking into Runtime Environments” »

Malicious Cryptography: Exposing Cryptovirology


Hackers have uncovered the dark side of cryptographythat device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. Its called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what youre up against and how to fight back. Continue reading “Malicious Cryptography: Exposing Cryptovirology” »

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems



It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You’ll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you’re on your way to packet analysis proficiency. Continue reading “Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems” »