Spiele mehr, zahle weniger
32,06 €

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lese bitte die Nutzungsbedingungen der jeweiligen Promotion.

Preis einschließlich USt.
Du hast abonniert! Wir werden deine Artikel innerhalb von 24 Stunden vorbestellen, sobald sie verfügbar sind. Wenn neue Bücher erscheinen, belasten wir deine Standardzahlungsmethode mit dem niedrigsten Preis, der während des Vorbestellungszeitraums verfügbar ist.
Aktualisiere dein Gerät oder deine Zahlungsart, storniere einzelne Vorbestellungen oder dein Abonnement unter
Meine Mitgliedschaften & Abos
Bild des Kindle App-Logos

Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.

Mit Kindle für Web kannst du sofort in deinem Browser lesen.

Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.

QR-Code zum Herunterladen der Kindle App

Den Autoren folgen

Ein Fehler ist aufgetreten. Wiederhole die Anfrage später noch einmal.

The Antivirus Hacker's Handbook (English Edition) 1. Auflage, Kindle Ausgabe

4,5 von 5 Sternen 50 Sternebewertungen

Hack your antivirus software to stamp out future vulnerabilities

The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data.

While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network.

  • Discover how to reverse engineer your antivirus software
  • Explore methods of antivirus software evasion
  • Consider different ways to attack and exploit antivirus software
  • Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software

The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.

Aufgrund der Dateigröße dauert der Download dieses Buchs möglicherweise länger.
Dieser Titel ist nur auf ausgewählten Geräten und der neuesten Version der Kindle-App verfügbar. Bitte beachte vor dem Kauf die Liste der unterstützten Geräte. Für diese Geräte erhältlich

Alle unterstützten Geräte anzeigen

Kindle E-Reader

  • Kindle Oasis (9. Generation)
  • Kindle Touch
  • Kindle Paperwhite
  • Kindle Paperwhite (5. Generation)
  • Der neue Kindle Paperwhite
  • Kindle Voyage
  • Kindle
  • Der neue Kindle eReader
  • Kindle Oasis
  • Kindle Paperwhite (10. Generation)
  • Kindle Oasis (10. Generation)
  • Kindle (11. Generation, Version 2024)
  • Kindle Paperwhite (12. Generation)
  • Kindle Scribe, 1. Generation (Version 2024)
  • Kindle (10. Generation)

Kindle Fire Tablets

  • Fire HD 8 (8. Generation)
  • Fire HD 10 (9. Generation)
  • Fire HD 8 (10. Generation)
  • Fire HD 10 Plus
  • Fire 7 (9. Generation)
  • Fire HD 10 (11. Generation)
  • Fire 7 (12. Generation)
  • Fire HD 8 Plus
  • Fire HD 8 (12. Generation)

Kostenlose Kindle Lese-Apps

  • Kindle für Android
  • Kindle für Android Tablets
  • Kindle für iPhone
  • Kindle für iPad
  • Kindle für PC
  • Kindle für Web
  • Kindle für Mac

Sicherheits- und Produktressourcen

Produktbeschreibungen

Klappentext

Hack your own antivirus software for an attacker's-eye look at the holes in your defense

Computer viruses are as contagious as the common cold, but they can be infinitely more destructive. Antivirus software is the best defense, but the quality of these defenses is as varied as the field itself. The Antivirus Hacker's Handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep your network locked up tight. Authors Joxean Koret and Elias Bachaalany draw on decades of reverse-engineering expertise to teach you how to see your system the way a hacker would — highlighting vulnerabilities and showing you where the next attack is likely to occur.

You'll begin by delving into the core of your antivirus software to learn how it works and where its own vulnerabilities lie. Then you'll exploit those weak defenses to gain a hacker's-eye view of your own system as you learn to evade, attack, and exploit antivirus software to gain "unauthorized" access to your network and data. When hackers reach this stage of the game, they can install malware that accesses sensitive information, monitor what the user is doing, and steal or corrupt documents and data. When you reach this stage, you'll have a thorough understanding of the holes in your defense strategy and the knowledge you need to make them impenetrable.

Learn to:

  • Reverse-engineer your antivirus software from the inside out
  • Understand the plug-ins system and antivirus signatures
  • Work your way around antivirus measures to strengthen your network
  • Evade signatures, scanners, and heuristic engines
  • Conduct static and dynamic analyses
  • Exploit local and remote exploit techniques
  • Discover the latest antivirus trends and recommendations

Buchrückseite

Hack your own antivirus software for an attacker's-eye look at the holes in your defense

Computer viruses are as contagious as the common cold, but they can be infinitely more destructive. Antivirus software is the best defense, but the quality of these defenses is as varied as the field itself. The Antivirus Hacker's Handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep your network locked up tight. Authors Joxean Koret and Elias Bachaalany draw on decades of reverse-engineering expertise to teach you how to see your system the way a hacker would highlighting vulnerabilities and showing you where the next attack is likely to occur.

You'll begin by delving into the core of your antivirus software to learn how it works and where its own vulnerabilities lie. Then you'll exploit those weak defenses to gain a hacker's-eye view of your own system as you learn to evade, attack, and exploit antivirus software to gain "unauthorized" access to your network and data. When hackers reach this stage of the game, they can install malware that accesses sensitive information, monitor what the user is doing, and steal or corrupt documents and data. When you reach this stage, you'll have a thorough understanding of the holes in your defense strategy and the knowledge you need to make them impenetrable.

Learn to:

  • Reverse-engineer your antivirus software from the inside out
  • Understand the plug-ins system and antivirus signatures
  • Work your way around antivirus measures to strengthen your network
  • Evade signatures, scanners, and heuristic engines
  • Conduct static and dynamic analyses
  • Exploit local and remote exploit techniques
  • Discover the latest antivirus trends and recommendations

Produktinformation

  • ASIN ‏ : ‎ B014MJ6AKS
  • Herausgeber ‏ : ‎ Wiley
  • Barrierefreiheit ‏ : ‎ Erfahre mehr
  • Erscheinungstermin ‏ : ‎ 27. August 2015
  • Auflage ‏ : ‎ 1.
  • Sprache ‏ : ‎ Englisch
  • Dateigröße ‏ : ‎ 12.3 MB
  • Screenreader ‏ : ‎ Unterstützt
  • Verbesserter Schriftsatz ‏ : ‎ Aktiviert
  • X-Ray ‏ : ‎ Nicht aktiviert
  • Word Wise ‏ : ‎ Nicht aktiviert
  • Seitenzahl der Print-Ausgabe ‏ : ‎ 339 Seiten
  • ISBN-13 ‏ : ‎ 978-1119028789
  • PageFlip ‏ : ‎ Aktiviert
  • Amazon Bestseller-Rang: Nr. 832.919 in Kindle-Shop (Siehe Top 100 in Kindle-Shop)
  • Kundenrezensionen:
    4,5 von 5 Sternen 50 Sternebewertungen

Über die Autoren

Folge Autoren, um Neuigkeiten zu Veröffentlichungen und verbesserte Empfehlungen zu erhalten.

Kundenrezensionen

4,5 von 5 Sternen
50 weltweite Bewertungen

Dieses Produkt bewerten

Sag deine Meinung zu diesem Artikel

Spitzenrezensionen aus Deutschland

Es liegen 0 Rezensionen und 1 Bewertung aus Deutschland vor

Spitzenrezensionen aus anderen Ländern

Alle Rezensionen ins Deutsche übersetzen
  • Scott Piper
    5,0 von 5 Sternen Excellent practical RE guide beyond AV
    Bewertet in den USA am16. Oktober 2015
    The book explains AV from both sides (the AV developer and the attacker) helping to explain why and how. @matalaz (Joxean) has done a lot of work attacking AV. Having @0xeb (Elias) help out, who was one of the creators of EMET, likely helps give that defender perspective. Both are former Hex-Rays (maker of IDA Pro) employees, so they are awesome reversers, and both are developers, so the code (python) you see in the book is clean. The writing is personable and enjoyable to read, like a mentor teaching a topic they love. It reads much like "Practical Reverse Engineering" (which Elias also helped write) and is a great combination with that, so from one you learn how to reverse in general, and from this you can see specifically how to reverse a class of products and apply that knowledge to doing vuln research on them.

    The book describes all of the components of AV, from file scanning, to it's update mechanism, to touching briefly on things like browser plugins. The authors have extensive knowledge of this class of products and so comments about many different AV products are sprinkled throughout.

    This is an excellent practical guide to reverse engineering in general, that just happens to have AV as the common theme. It assumes some RE knowledge with IDA Pro, but beyond that everything else is free, open-source tools, with some (Diaphora and BCCF) written by Joxean. It uses every technique available to reverse products, such as investigating versions for different OSs which may have more symbols. It shows how to set up frameworks to run the AV's core scanner, which can help with not only fuzzing, but also is an important generic RE skill for using or testing a product's features.

    It is a practical guide to vuln research and shows how to investigate many areas of an attack surface. The focus is on file format fuzzing (as that is the biggest attack surface of AVs) but it also discusses permission and logical issues for escalation of privileges, MiTM attacks on the updates, and evasion tactics.

    My biggest concern with the book is that no versions or hashes or files being reversed are mentioned, and no download archive specific to the book appears to be available, so in time (now?) it won't be possible to play along with some of the reversing sessions and use the framework bindings. The concepts and material stand on their own, but it'd be nice to see an archive of these files appear on the Internet somewhere.
    Melden
  • Charlotte
    5,0 von 5 Sternen Excellent book
    Bewertet in Großbritannien am 24. Januar 2016
    Amazon Vine Kundenrezension eines kostenlosen Produkts( Was ist das? )
    The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.

    The book is designed for intermediate level and above; if you are a novice, this isn't the book for you!

    Though this is a very technical book, it has been very clearly written and well designed to make it as easy for the reader to navigate and understand the content as possible.
  • Andri Puspo Heriyanto
    5,0 von 5 Sternen It's a good literature for those who has an interest in detail ...
    Bewertet in Australien am 2. Oktober 2015
    It's a good literature for those who has an interest in detail and technical aspect of Anti-virus application. Especially how to use the AV apps beyond the common things.
  • GZH
    4,0 von 5 Sternen Bonne intro
    Bewertet in Frankreich am 24. Dezember 2015
    Pour travailler dans la sécurité informatique depuis qq temps, je ne savais pas trop à quoi m'attendre avec ce livre..
    Au final c'est plutôt une bonne surprise, le livre est accessible, correctement structuré, avec pas mal d'exemples et des codes commentés.

    Par contre cela ne vaut pas 5 étoiles car :
    - les exemples sont quand même relativement connus et anciens (bien que basés parfois sur le travail de l'auteur) et relativement simples
    - dans un chapitre il y a carrément 3/4 pages de code commentés...en russe. Vive le c/c.
  • Woopers
    5,0 von 5 Sternen Great book! I'm normally not a fan of the ...
    Bewertet in den USA am17. November 2015
    Great book! I'm normally not a fan of the hackers handbook series as it's very high level, but this book does a great job digging into the inside workings of many AVs and provides several cleaver scripts to interact\evade\test AVs. A must for any software developer working in the security community! I put this at the same level as Practical Malware Analysis, the Butler Rootkits book, the C KNR book and Richards TCP/IP Illustrated! It's that good!

Ein Problem melden


Enthält dieser Artikel unangemessenen Inhalt?
Glaubst du, dass dieser Artikel gegen ein Urheberrecht verstößt?
Liegen bei diesem Artikel Qualitäts- oder Formatierungsprobleme vor?