Web Hacking Exposed

Each chapter in Hacking Exposed:Windows contains a wealth of links to Internet resources related to the topic of Windows security. We've included a sampling of those links here. We're in the process of organizing this information (and much more from the rest of the book) into broad topic areas. If you have a suggestion for this page (vendor-neutral only suggestions, please), send them to [joel at winhackingexposed dot com]. For a listing of tools and techniques described throughout Hacking Exposed: Windows, see our Tools page.

Chapter 8, Achieving Stealth and Maintaining Presence
The Cuckoo's Egg
UNIX Rootkit CERT Advisory
Abuse of the Linux Kernel for Fun and Profit
Weakening the Linux Kernel
YYT_HAC Rootkit
A *REAL* NT Rootkit, patching the NT kernel
Aspects of Offensive Rootkit Technology course
"Windows Root kits a stealthy threat," by Kevin Poulsen
Microsoft Security Bulletin MS03-026: Buffer Overrun in RPC Interface Could Allow Code Execution
You cannot remove suspicious folders from the FTP file structure
You cannot delete a file or a folder on an NTFS file system volume
IE usage survey
F-Secure Blacklight
Malicious Software Encyclopedia: WinNT/Ispro
David Aucsmith - WinHEC
MSRC Blog About Delprot Rootkit & MSRT
Shadow Walker announced at Blackhat
Shadow Walker Presentation
Blue Pill Rootkit
Rustock and Advances in Rootkits
GMER Rootkit Detection Tool
"Rustock DDoS Attack" by Joe Stewart
RKUnhooker Rootkit Detection Tool created by authors of Unreal.A rootkit
Office Documents containing a rootkit (Trojan.PPDropper.F)
Office Documents containing a rootkit (Backdoor.Ginwui.E)
Authentium defeats Patchguard
Uninformed Analysis of Patchguard
Uninformed Analysis of Patchguard
Kernel-mode Code Signing Policy Overview
Restricted Access to \Device\PhysicalMemory
System Virginity Verifier (SVV)
AutoRuns for Windows
Hacker Defender: Remote Rootkit Scanner for Windows
WinObj v2.15
Vitriol Rootkit at BlueHat
Attachment Manager API
Streams v1.56

Chapter 9: Hacking SQL Server
Code generation tools
Improving Data Security by Using SQL Server 2005
Microsoft SQL Server 2000 Security Whitepaper
SQL Server 2000 Best Practices Analyzer
SQL Slammer Worm
"New SQL Truncation Attacks and How to Avoid Them," by Bala Neerumalla
Advanced SQL Injection in SQL Server Applications
SQL Security Lockdown Script for SQL 2000
Copyright © 2008. All Rights Reserved. Designed by HTMLfx