Windows Rootkit相关链接

[ 1] Avoiding Windows Rootkit Detection/Bypassing PatchFinder 2 - Edgar Barbosa[2004-02-17]
   url.gifhttp://www.geocities.com/embarbosa/bypass/bypassEPA.pdf

[ 2] TOCTOU with NT System Service Hooking
   url.gifhttp://www.securityfocus.com/archive/1/348570

   TOCTOU with NT System Service Hooking Bug Demo
   url.gifhttp://www.securesize.com/Resources/hookdemo.shtml

[ 3] Hooking Windows NT System Services
   url.gifhttp://www.windowsitlibrary.com/content/356/06/1.html
   url.gifhttp://www.windowsitlibrary.com/content/356/06/2.html

[ 4] NTIllusion: A portable Win32 userland rootkit - Kdm <Kodmaker@syshell.org>
   url.gifhttp://www.phrack.org/phrack/62/p62-0x0c_Win32_Portable_Userland_Rootkit.txt

[ 5] Kernel-mode backdoors for Windows NT - firew0rker <firew0rker@nteam.ru>
   url.gifhttp://www.phrack.org/phrack/62/p62-0x06_Kernel_Mode_Backdoors_for_Windows_NT.txt

[ 6] Win2K Kernel Hidden Process/Module Checker 0.1 (Proof-Of-Concept) - Tan Chew Keong[2004-05-23]
   url.gifhttp://www.security.org.sg/code/kproccheck.html
   url.gifhttp://www.security.org.sg/code/KProcCheck-0.1.zip

[ 7] port/connection hiding - akcom[2004-06-18]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=143

[ 8] Process Invincibility - metro_mystery[2004-06-13]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=139

[ 9] KCode Patching - hoglund[2004-06-06]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=152
   url.gifhttp://www.rootkit.com/vault/hoglund/migbot.zip

[10] Hiding Window Handles through Shadow Table Hooking on Windows XP - metro_mystery[2004-06-12]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=137

[11] hooking functions not exported by ntoskrnl - akcom[2004-07-02]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=151

[12] A method of get the Address of PsLoadedModuleList - stoneclever[2004-06-10]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=135

[13] Fun with Kernel Structures (Plus FU all over again) - fuzen_op[2004-06-08]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=134
   url.gifhttp://www.rootkit.com/vault/fuzen_op/FU_Rootkit.zip

[14] Getting Kernel Variables from KdVersionBlock, Part 2 - ionescu007[2004-07-11]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=153

[15] Byepass Scheduler List Process Detection - SoBeIt <kinvis@hotmail.com>[2004-04-25]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=117

[16] Detecting Hidden Processes by Hooking the SwapContext Function - worthy[2004-08-03]
   url.gifhttp://www.rootkit.com/newsread_print.php?newsid=170

转载于:https://www.cnblogs.com/suiyingjie/archive/2006/09/14/504195.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值