Rootkits for Dummies

From the Back Cover
Recognize rootkits and plan your counter-attack
Here’s how to root out this malicious software and manage damage control

Rootkits are diabolical, virtually invisible ways for someone to hijack your data, computer, or worse — your entire network. But never fear — this book reveals their ugly secrets and shows you exactly how to identify them, yank them out, repair the damage they’ve done, and set up defenses to keep new ones from taking root in your system.

Discover how to

Identify types of rootkits
Keep your computer clean
Root out invasive software
Protect your system with regular updates
Plan for recovery
Recognize when you have to start over
All on the bonus CD-Rom

CD includes

Anti-malware utilities and scanners
Backup and imaging applications
System analysis programs
Rootkit-detection-and-removal applications
Password protectors and generators
For details and complete system requirements, see the CD-ROM appendix

About the Author
Larry Stevenson is a veteran security consultant and instructor.

Nancy Altholz is a Microsoft Security MVP and security expert. Both are associated with CastleCops.com, a resource for security professionals.

Related Articles

Rootkits for Dummies

A rootkit is a type of malicious software that gives the hacker “root” or administrator access to your network. They are activated before your system’s operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected.
Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control.

Accompanying the book is a value-packed companion CD offering a unique suite of tools to help administrators and users detect rootkit problems, conduct forensic analysis, and make quick security fixes.

Rootkits for Dummies

A rootkit is a type of malicious software that gives the hacker “root” or administrator access to your network. They are activated before your system’s operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, connections, and keyboards. A rootkit hacker can gain access to your systems and stay there for years, completely undetected.
Learn from respected security experts and Microsoft Security MVPs how to recognize rootkits, get rid of them, and manage damage control.

Accompanying the book is a value-packed companion CD offering a unique suite of tools to help administrators and users detect rootkit problems, conduct forensic analysis, and make quick security fixes.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Hacking for Dummies

While you’re reading this, a hacker could be prying and spying his way into your company’s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker’s mindset and take security precautions to help you avoid a hack attack. It outlines computer hacker tricks and techniques you can use to assess the security of your own information systems, find security vulnerabilities, and fix them before malicious and criminal hackers can exploit them. It covers:

Hacking methodology and researching public information to see what a hacker can quickly learn about your operations
Social engineering (how hackers manipulate employees to gain information and access), physical security, and password vulnerabilities
Network infrastructure, including port scanners, SNMP scanning, banner grabbing, scanning, and wireless LAN vulnerabilities
Operating systems, including Windows, Linux, and Novell NetWare
Application hacking, including malware (Trojan horses, viruses, worms, rootkits, logic bombs, and more), e-mail and instant messaging, and Web applications
Tests, tools (commercial, shareware, and freeware), and techniques that offer the most bang for your ethical hacking buck

With this guide you can develop and implement a comprehensive security assessment plan, get essential support from management, test your system for vulnerabilities, take countermeasures, and protect your network infrastructure. You discover how to beat hackers at their own game, with:

A hacking toolkit, including War dialing software, password cracking software, network scanning software, network vulnerability assessment software, a network analyzer, a Web application assessment tool, and more
All kinds of countermeasures and ways to plug security holes
A list of more than 100 security sites, tools, and resources

Ethical hacking helps you fight hacking with hacking, pinpoint security flaws within your systems, and implement countermeasures. Complete with tons of screen shots, step-by-step instructions for some countermeasures, and actual case studies from IT security professionals, this is an invaluable guide, whether you’re an Internet security professional, part of a penetration-testing team, or in charge of IT security for a large or small business.

Hacking for Dummies 2nd Edition

Are you worried about external hackers and rogue insiders breaking into your systems? Whether it’s social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself—an ethical hacker.
Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound.

You’ll discover how to:

Work ethically, respect privacy, and save your system from crashing
Develop a hacking plan
Treat social engineers and preserve their honesty
Counter war dialing and scan infrastructures
Understand the vulnerabilities of Windows, Linux, and Novell NetWare
Prevent breaches in messaging systems, web applications, and databases
Report your results and managing security changes
Avoid deadly mistakes
Get management involved with defending your systems
As we enter into the digital era, protecting your systems and your company has never been more important. Don’t let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

Hacking For Dummies 5th Edition

Learn to hack your own system to protect against malicious attacks from outside
Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources.

Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network.

Defend your system—and all of the data it holds—against the latest Windows 10 and Linux hacks
Develop an effective ethical hacking plan that keeps your system safe
Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies
Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure

Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list.