Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Elias Bachaalany, Joxean Koret
The Antivirus Hacker's Handbook
Introduction
Overview of the Book and Technology
How This Book Is Organized
Who Should Read This Book
Tools You Will Need
What's on the Wiley Website
Summary (From Here, Up Next, and So On)
Part I: Antivirus Basics
Chapter 1: Introduction to Antivirus Software
What Is Antivirus Software?
Antivirus Software: Past and Present
Antivirus Scanners, Kernels, and Products
Typical Misconceptions about Antivirus Software
Antivirus Features
Summary
Chapter 2: Reverse-Engineering the Core
Reverse-Engineering Tools
Debugging Tricks
Porting the Core
A Practical Example: Writing Basic Python Bindings for Avast for Linux
A Practical Example: Writing Native C/C++ Tools for Comodo Antivirus for Linux
Other Components Loaded by the Kernel
Summary
Chapter 3: The Plug-ins System
Understanding How Plug-ins Are Loaded
Types of Plug-ins
Some Advanced Plug-ins
Summary
Chapter 4: Understanding Antivirus Signatures
Typical Signatures
Advanced Signatures
Summary
Chapter 5: The Update System
Understanding the Update Protocols
Dissecting an Update Protocol
When Protection Is Done Wrong
Summary
Part II: Antivirus Software Evasion
Chapter 6: Antivirus Software Evasion
Who Uses Antivirus Evasion Techniques?
Discovering Where and How Malware Is Detected
Summary
Chapter 7: Evading Signatures
File Formats: Corner Cases and Undocumented Cases
Evading a Real Signature
Evasion Tips and Tricks for Specific File Formats
Summary
Chapter 8: Evading Scanners
Generic Evasion Tips and Tricks
Automating Evasion of Scanners
Summary
Chapter 9: Evading Heuristic Engines
Heuristic Engine Types
Summary
Chapter 10: Identifying the Attack Surface
Understanding the Local Attack Surface
Incorrect Access Control Lists
Understanding the Remote Attack Surface
Summary
Chapter 11: Denial of Service
Local Denial-of-Service Attacks
Remote Denial-of-Service Attacks
Summary
Part III: Analysis and Exploitation
Chapter 12: Static Analysis
Performing a Manual Binary Audit
Summary
Chapter 13: Dynamic Analysis
Fuzzing
Summary
Chapter 14: Local Exploitation
Exploiting Backdoors and Hidden Features
Finding Invalid Privileges, Permissions, and ACLs
Searching Kernel-Land for Hidden Features
More Logical Kernel Vulnerabilities
Summary
Chapter 15: Remote Exploitation
Implementing Client-Side Exploitation
Server-Side Exploitation
Summary
Part IV: Current Trends and Recommendations
Chapter 16: Current Trends in Antivirus Protection
Matching the Attack Technique with the Target
Targeting Governments and Big Companies
Summary
Chapter 17: Recommendations and the Possible Future
Recommendations for Users of Antivirus Products
Recommendations for Antivirus Vendors
Summary
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Acknowledgments
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley's ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset