资源说明:Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software-all of which can help you strengthen your network and protect your data. While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. * Discover how to reverse engineer your antivirus software * Explore methods of antivirus software evasion * Consider different ways to attack and exploit antivirus software * Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.
Table of Contents
Part I Antivirus Basics
Chapter 1 Introduction to Antivirus Software
Chapter 2 Reverse-Engineering the Core
Chapter 3 The Plug-ins System
Chapter 4 Understanding Antivirus Signatures
Chapter 5 The Update System
Part II Antivirus Software Evasion
Chapter 6 Antivirus Software Evasion
Chapter 7 Evading Signatures
Chapter 8 Evading Scanners
Chapter 9 Evading Heuristic Engines
Chapter 10 Identifying the Attack Surface
Chapter 11 Denial of Service
Part III Analysis and Exploitation
Chapter 12 Static Analysis
Chapter 13 Dynamic Analysis
Chapter 14 Local Exploitation
Chapter 15 Remote Exploitation
Part IV Current Trends and Recommendations
Chapter 16 Current Trends in Antivirus Protection
Chapter 17 Recommendations and the Possible Future
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。