The.Antivirus.Hackers.Handbook.1119028752
文件大小: 5791k
源码售价: 10 个金币 积分规则     积分充值
资源说明:Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software-all of which can help you strengthen your network and protect your data. While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. * Discover how to reverse engineer your antivirus software * Explore methods of antivirus software evasion * Consider different ways to attack and exploit antivirus software * Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications. Table of Contents Part I Antivirus Basics Chapter 1 Introduction to Antivirus Software Chapter 2 Reverse-Engineering the Core Chapter 3 The Plug-ins System Chapter 4 Understanding Antivirus Signatures Chapter 5 The Update System Part II Antivirus Software Evasion Chapter 6 Antivirus Software Evasion Chapter 7 Evading Signatures Chapter 8 Evading Scanners Chapter 9 Evading Heuristic Engines Chapter 10 Identifying the Attack Surface Chapter 11 Denial of Service Part III Analysis and Exploitation Chapter 12 Static Analysis Chapter 13 Dynamic Analysis Chapter 14 Local Exploitation Chapter 15 Remote Exploitation Part IV Current Trends and Recommendations Chapter 16 Current Trends in Antivirus Protection Chapter 17 Recommendations and the Possible Future
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。