Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

This Book explores the inner workings of various malware, including the TDL3 and TDL4 rootkits and the Festi, Rovnix, Gapz, and Olmasco bootkits. The text details the infection techniques used by these malicious programs, focusing on how they manipulate the boot process and evade security measures. It also examines methods for analyzing these bootkits, employing both static and dynamic analysis techniques using tools like IDA Pro and Bochs. Finally, the book addresses UEFI firmware and BIOS vulnerabilities, explaining how they can be exploited by malware and the evolving security measures implemented to counteract these threats.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Rootkits-Bootkits-Reversing-Malware-Generation/dp/1593277164?&linkCode=ll1&tag=cvthunderx-20&linkId=5ea61c444eb5eb6f7e88e79f4b9f0f58&language=en_US&ref_=as_li_ss_tl

Om Podcasten

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary