This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The text details the infection techniques used by these malicious programs, focusing on how they manipulate the boot process and evade security measures. It also examines methods for analyzing these bootkits, employing both static and dynamic analysis techniques using tools like IDA Pro and Bochs. Finally, the book addresses UEFI firmware and BIOS vulnerabilities, explaining how they can be exploited by malware and the evolving security measures implemented to counteract these threats.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Rootkits-Bootkits-Reversing-Malware-Generation/dp/1593277164?&linkCode=ll1&tag=cvthunderx-20&linkId=5ea61c444eb5eb6f7e88e79f4b9f0f58&language=en_US&ref_=as_li_ss_tl
Published on 3 months, 2 weeks ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate