Diese Aktionen werden auf diesen Artikel angewendet:
Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lese bitte die Nutzungsbedingungen der jeweiligen Promotion.
Meine Mitgliedschaften & Abos
Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.
Mit Kindle für Web kannst du sofort in deinem Browser lesen.
Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.
Bild nicht verfügbar
Farbe:
-
-
-
- Herunterladen, um dieses Videos wiederzugeben Flash Player
Den Autoren folgen
OK
The Antivirus Hacker's Handbook (English Edition) 1. Auflage, Kindle Ausgabe
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data.
While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network.
- Discover how to reverse engineer your antivirus software
- Explore methods of antivirus software evasion
- Consider different ways to attack and exploit antivirus software
- Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software
The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.
- ISBN-13978-1119028789
- Auflage1.
- HerausgeberWiley
- Erscheinungstermin27. August 2015
- SpracheEnglisch
- Dateigröße12.3 MB
Alle unterstützten Geräte anzeigen
Kindle E-Reader
- Kindle Oasis (9. Generation)
- Kindle Touch
- Kindle Paperwhite
- Kindle Paperwhite (5. Generation)
- Der neue Kindle Paperwhite
- Kindle Voyage
- Kindle
- Der neue Kindle eReader
- Kindle Oasis
- Kindle Paperwhite (10. Generation)
- Kindle Oasis (10. Generation)
- Kindle (11. Generation, Version 2024)
- Kindle Paperwhite (12. Generation)
- Kindle Scribe, 1. Generation (Version 2024)
- Kindle (10. Generation)
Kindle Fire Tablets
- Fire HD 8 (8. Generation)
- Fire HD 10 (9. Generation)
- Fire HD 8 (10. Generation)
- Fire HD 10 Plus
- Fire 7 (9. Generation)
- Fire HD 10 (11. Generation)
- Fire 7 (12. Generation)
- Fire HD 8 Plus
- Fire HD 8 (12. Generation)
Kostenlose Kindle Lese-Apps
- Kindle für Android
- Kindle für Android Tablets
- Kindle für iPhone
- Kindle für iPad
- Kindle für PC
- Kindle für Web
- Kindle für Mac
Sicherheits- und Produktressourcen
Bilder und Kontakte
Sicherheits- und Produktressourcen
Problem beim Laden der Informationen
Bilder und Kontakte
Produktbeschreibungen
Klappentext
Hack your own antivirus software for an attacker's-eye look at the holes in your defense
Computer viruses are as contagious as the common cold, but they can be infinitely more destructive. Antivirus software is the best defense, but the quality of these defenses is as varied as the field itself. The Antivirus Hacker's Handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep your network locked up tight. Authors Joxean Koret and Elias Bachaalany draw on decades of reverse-engineering expertise to teach you how to see your system the way a hacker would highlighting vulnerabilities and showing you where the next attack is likely to occur.
You'll begin by delving into the core of your antivirus software to learn how it works and where its own vulnerabilities lie. Then you'll exploit those weak defenses to gain a hacker's-eye view of your own system as you learn to evade, attack, and exploit antivirus software to gain "unauthorized" access to your network and data. When hackers reach this stage of the game, they can install malware that accesses sensitive information, monitor what the user is doing, and steal or corrupt documents and data. When you reach this stage, you'll have a thorough understanding of the holes in your defense strategy and the knowledge you need to make them impenetrable.
Learn to:
- Reverse-engineer your antivirus software from the inside out
- Understand the plug-ins system and antivirus signatures
- Work your way around antivirus measures to strengthen your network
- Evade signatures, scanners, and heuristic engines
- Conduct static and dynamic analyses
- Exploit local and remote exploit techniques
- Discover the latest antivirus trends and recommendations
Buchrückseite
Hack your own antivirus software for an attacker's-eye look at the holes in your defense
Computer viruses are as contagious as the common cold, but they can be infinitely more destructive. Antivirus software is the best defense, but the quality of these defenses is as varied as the field itself. The Antivirus Hacker's Handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep your network locked up tight. Authors Joxean Koret and Elias Bachaalany draw on decades of reverse-engineering expertise to teach you how to see your system the way a hacker would highlighting vulnerabilities and showing you where the next attack is likely to occur.
You'll begin by delving into the core of your antivirus software to learn how it works and where its own vulnerabilities lie. Then you'll exploit those weak defenses to gain a hacker's-eye view of your own system as you learn to evade, attack, and exploit antivirus software to gain "unauthorized" access to your network and data. When hackers reach this stage of the game, they can install malware that accesses sensitive information, monitor what the user is doing, and steal or corrupt documents and data. When you reach this stage, you'll have a thorough understanding of the holes in your defense strategy and the knowledge you need to make them impenetrable.
Learn to:
- Reverse-engineer your antivirus software from the inside out
- Understand the plug-ins system and antivirus signatures
- Work your way around antivirus measures to strengthen your network
- Evade signatures, scanners, and heuristic engines
- Conduct static and dynamic analyses
- Exploit local and remote exploit techniques
- Discover the latest antivirus trends and recommendations
Über die Autorenschaft und weitere Mitwirkende
JOXEAN KORET is a security researcher at Coseinc, a Singapore-based security services firm. He is an in-demand speaker at international security conferences, and a well-regarded specialist in reverse-engineering, vulnerability research, and malware analysis.
ELIAS BACHAALANY is a computer programmer, reverse engineer, and technical writer employed by Microsoft. An authority in multiple programming languages, database design, and web development, he played an instrumental role in the IDAPython project and IDA Pro's scripting facilities development.
Produktinformation
- ASIN : B014MJ6AKS
- Herausgeber : Wiley
- Barrierefreiheit : Erfahre mehr
- Erscheinungstermin : 27. August 2015
- Auflage : 1.
- Sprache : Englisch
- Dateigröße : 12.3 MB
- Screenreader : Unterstützt
- Verbesserter Schriftsatz : Aktiviert
- X-Ray : Nicht aktiviert
- Word Wise : Nicht aktiviert
- Seitenzahl der Print-Ausgabe : 339 Seiten
- ISBN-13 : 978-1119028789
- PageFlip : Aktiviert
- Amazon Bestseller-Rang: Nr. 832.919 in Kindle-Shop (Siehe Top 100 in Kindle-Shop)
- Nr. 633 in Datensicherheit & Verschlüsselung (englischsprachig)
- Nr. 5.397 in PC- & Internetsicherheit (Bücher)
- Nr. 8.681 in Fremdsprachiges über Computer & Internet
- Kundenrezensionen:
Über die Autoren

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.
Kundenrezensionen
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern5 Sterne67%24%4%5%0%67%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern4 Sterne67%24%4%5%0%24%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern3 Sterne67%24%4%5%0%4%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern2 Sterne67%24%4%5%0%5%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern1 Stern67%24%4%5%0%0%
Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist.
Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen.
Erfahren Sie mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.Spitzenrezensionen aus Deutschland
Spitzenrezensionen aus anderen Ländern
-
Scott PiperBewertet in den USA am16. Oktober 20155,0 von 5 Sternen Excellent practical RE guide beyond AV
The book explains AV from both sides (the AV developer and the attacker) helping to explain why and how. @matalaz (Joxean) has done a lot of work attacking AV. Having @0xeb (Elias) help out, who was one of the creators of EMET, likely helps give that defender perspective. Both are former Hex-Rays (maker of IDA Pro) employees, so they are awesome reversers, and both are developers, so the code (python) you see in the book is clean. The writing is personable and enjoyable to read, like a mentor teaching a topic they love. It reads much like "Practical Reverse Engineering" (which Elias also helped write) and is a great combination with that, so from one you learn how to reverse in general, and from this you can see specifically how to reverse a class of products and apply that knowledge to doing vuln research on them.
The book describes all of the components of AV, from file scanning, to it's update mechanism, to touching briefly on things like browser plugins. The authors have extensive knowledge of this class of products and so comments about many different AV products are sprinkled throughout.
This is an excellent practical guide to reverse engineering in general, that just happens to have AV as the common theme. It assumes some RE knowledge with IDA Pro, but beyond that everything else is free, open-source tools, with some (Diaphora and BCCF) written by Joxean. It uses every technique available to reverse products, such as investigating versions for different OSs which may have more symbols. It shows how to set up frameworks to run the AV's core scanner, which can help with not only fuzzing, but also is an important generic RE skill for using or testing a product's features.
It is a practical guide to vuln research and shows how to investigate many areas of an attack surface. The focus is on file format fuzzing (as that is the biggest attack surface of AVs) but it also discusses permission and logical issues for escalation of privileges, MiTM attacks on the updates, and evasion tactics.
My biggest concern with the book is that no versions or hashes or files being reversed are mentioned, and no download archive specific to the book appears to be available, so in time (now?) it won't be possible to play along with some of the reversing sessions and use the framework bindings. The concepts and material stand on their own, but it'd be nice to see an archive of these files appear on the Internet somewhere.
-
CharlotteBewertet in Großbritannien am 24. Januar 20165,0 von 5 Sternen Excellent book
The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.
The book is designed for intermediate level and above; if you are a novice, this isn't the book for you!
Though this is a very technical book, it has been very clearly written and well designed to make it as easy for the reader to navigate and understand the content as possible.
-
Andri Puspo HeriyantoBewertet in Australien am 2. Oktober 20155,0 von 5 Sternen It's a good literature for those who has an interest in detail ...
It's a good literature for those who has an interest in detail and technical aspect of Anti-virus application. Especially how to use the AV apps beyond the common things.
-
GZHBewertet in Frankreich am 24. Dezember 20154,0 von 5 Sternen Bonne intro
Pour travailler dans la sécurité informatique depuis qq temps, je ne savais pas trop à quoi m'attendre avec ce livre..
Au final c'est plutôt une bonne surprise, le livre est accessible, correctement structuré, avec pas mal d'exemples et des codes commentés.
Par contre cela ne vaut pas 5 étoiles car :
- les exemples sont quand même relativement connus et anciens (bien que basés parfois sur le travail de l'auteur) et relativement simples
- dans un chapitre il y a carrément 3/4 pages de code commentés...en russe. Vive le c/c.
-
WoopersBewertet in den USA am17. November 20155,0 von 5 Sternen Great book! I'm normally not a fan of the ...
Great book! I'm normally not a fan of the hackers handbook series as it's very high level, but this book does a great job digging into the inside workings of many AVs and provides several cleaver scripts to interact\evade\test AVs. A must for any software developer working in the security community! I put this at the same level as Practical Malware Analysis, the Butler Rootkits book, the C KNR book and Richards TCP/IP Illustrated! It's that good!