Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Wizzywig: Portrait of a Serial Hacker


Ed Piskor - 2012
    but Kevin "Boingthump" Phenicle could always see more than most people. In the world of phone phreaks, hackers, and scammers, he's a legend. His exploits are hotly debated: could he really get free long-distance calls by whistling into a pay phone? Did his video-game piracy scheme accidentally trigger the first computer virus? And did he really dodge the FBI by using their own wiretapping software against them? Is he even a real person? And if he's ever caught, what would happen to a geek like him in federal prison? Inspired by the incredible stories of real-life hackers, Wizzygig is the thrilling tale of a master manipulator -- his journey from precocious child scammer to federally-wanted fugitive, and beyond. In a world transformed by social networks and data leaks, Ed Piskor's debut graphic novel reminds us how much power can rest in the hands of an audacious kid with a keyboard.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage


Gordon Corera - 2015
    The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency


Parmy Olson - 2012
    WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.

Black Tornado: The Military Operations of 26/11


Sandeep Unnithan - 2014
    Ten highly motivated and trained terrorists, armed with guns, grenades and improvised explosive devices, slip past coastal security cordons on India's western seacoast in a fishing trawler. They board a rubber dinghy and disembark at Machhimar Nagar, Colaba, Mumbai. Over the next three agonizing days, India's 'Maximum City' is brought to its knees as the fidayeen wreak unprecedented havoc at pre-selected landmarks, holding India's commercial capital hostage. The 26/11 attacks, as they are now known, is widely regarded as the world's first hybrid terrorist attack. The attackers achieved through this long-drawn siege what Al Qaeda did through the high-visibility mass-casualty attack of 11 September 2001. The response to this attack was the first instance of all three wings of the Indian armed forces coming together to fight terror. The attacks tested the mettle of India's elite counter-terrorist force, the National Security Guard, whose strike element was entirely made up of army personnel; the navy dispatched its marine commandos in the initial hours of the attack; the air force flew the NSG into the city and air-dropped them over Nariman House. Black Tornado, as the operation was called by the NSG, is the story of these men called into action in the desperate hours following the most sensational terrorist attack the country has ever seen. Sandeep Unnithan puts together a blow-by-blow account of the terrorist strike and how the siege of Mumbai was thwarted by India's security forces.

Scum America: The Stupid Factor (The Factors Series Book 1)


Scott McMurrey - 2020
    

Lucky Bastard


Charles McCarry - 1998
    John Fitzgerald Adams, a charming liar and womanizer who is convinced that he is the bastard son of JFK, runs for President in a campaign organized and financed by a foreign secret service. A darkly entertaining study of sex and power in the era of the Clinton White House.

The Double Traitor


E. Phillips Oppenheim - 1915
    "This young man is your slave. Whatever your daily business may be here, some part of your time, I imagine, will be spent in his company. Let me know what manner of man he is. Is this innate corruptness which brings him so easily to the bait, or is it the stinging smart of injustice from which he may well be suffering? Or, failing these, has he dared to set his wits against mine, to play the double traitor? If even a suspicion of this should come to you, there must be an end of Mr. Francis Norgate."

Requiem for a Patriot (Captain Harry Tennant Mystery Book 2)


David J. Oldman - 2018
     It’s an Arctic January day, one of the coldest winters on record. A man on a deserted East Anglian beach strips naked, neatly folds his clothes and wades into the icy waters. Walks to his death. His final moments are watched by Harry Tennant. The ex-copper has been assigned to observe his target by British Intelligence. The dead man is Joseph Wolff. He is a Russian Jew. He is also a professor of mathematics at Oxford University. All Harry knows is that Wolff had been doing some sort of secret work during the war. So when Wolff waded into the sea and drowned himself, he could not make sense of it. Back in the hotel room where Woolf was staying, Harry discovers an unfinished note hinting of betrayal. Harry can’t resist following a trail of unanswered questions buzzing in his head. It’s a long and tortuous trail that leaves him just staring in the ever more inscrutable face of British Intelligence. David J Oldman’s compassionate and compelling Requiem for a Patriot offers a fictional version of what was happening in Britain during and immediately after of the Second World War as East and West drew closer and closer to head-on collision. It explores a shocking secret. Thoroughly researched and based on actual events, the novel succeeds in combining all-too-human stories with political intrigue, spy rings and cold-blooded murder. It paints a frightening picture of the helplessness of the individual when faced by the monolith that is the state. Born into the austerity of post-war Britain, David J. Oldman began writing in his early twenties. Frequently humorous, and often moving, his books are an examination of ordinary people caught up in life-changing events beyond their control. He presently lives with his wife in the New Forest in the south of England pursuing his deep interest in history, writers and writing. Also published by Endeavour Media is Oldman’s The Unquiet Grave.

Ghosts of the Past


Harry McCallion - 2016
    Each was armed with a 9mm Beretta automatic pistol, yet there are no signs of a struggle. As the police investigation gets into full swing, Detective Inspector Nevin Brown of the Royal Ulster Constabulary steps into the frame. Recently arrived in London on a six-month attachment to the Metropolitan police, Nevin’s natural flair for analysis and his years of experience in the field in Northern Ireland come to the attention of his superiors. He is charged with the task of heading up his own enquiry into the double murder. Nevin’s investigation soon leads him to Countess Natasha Romanov, a cruel and glamorous cultural Russian cultural attaché, and Ivan Dragenoff, her physically imposing bodyguard and manservant. Nevin is convinced of the countess’ guilt, but her meticulous nature has ensured that, other than one eyewitness, he has no hard evidence to back up his claims. Yet when his only witness to the crime is found at the bottom of a flight of stairs with her neck broken, Nevin also realises that something is rotten in the Metropolitan Police. Only a select few police officers knew the whereabouts and identity of the witness, and now she has been murdered. To make matters worse, MI5 have received intelligence that Nevin’s nemesis, a vicious IRA assassin by the name of Anthony Kane, has arrived in London and is preparing to carry out one last assassination that could have drastic consequences for the Northern Ireland peace process. Before long, Nevin is drawn into an intricate web of loyalty and treachery. A plot involving the Russian mafia, Colombian drug cartels and the Provisional IRA begins to unravel, leading to an exhilarating climax that will jeopardise his own life, the lives of the ones he loves and his unerring commitment to justice. Praise for Harry McCallion: “A stun grenade of a book” - Sunday Express “A story of daring and adventure” - Daily Mail “A remarkable tale of life on the edge” - Glasgow Herald “McCallion is the hardest man you could encounter” - The Independent Born in Glasgow, Harry McCallion joined the army after leaving school. In a varied and exciting military career he served with the Parachute Regiment, South Africa’s elite Recce Commandos and 22 SAS. After leaving the army in 1985 he joined the RUC, but left in 1990 after a near-fatal car crash. Subsequent to this he studied law and was called to the Bar. Now a working barrister and writer he has recently received his Master’s Degree in International Relations. His autobiography Killing Zone was an immediate bestseller. Endeavour Press is the UK's leading independent digital publisher. For more information on our titles please sign up to our newsletter at www.endeavourpress.com. Each week you will receive updates on free and discounted ebooks. Follow us on Twitter: @EndeavourPress and on Facebook via http://on.fb.me/1HweQV7. We are always interested in hearing from our readers. Endeavour Press believes that the future is now.

The Bourne Identity. Volume 2 (Jason Bourne, #1.2)


Robert Ludlum - 1980
    

Geek Mafia: Mile Zero


Rick Dakan - 2007
    Key West—originally Cayo Huesos or Isle of Bones, for centuries a refuge for pirates, wreckers, writers, scoundrels, drunks, and tourists. Now home to a Crew of techno geek con artists who've turned it into their own private hunting ground. Paul and Chloe have the run of the sun-drenched island, free to play and scam far from the enemies they left behind in Silicon Valley. But that doesn't mean they can't bring a little high tech know how to the paradise. They and their new Crew have covered the island with their own private Big Brother style network—hidden cameras, RFID sensors, and a web of informers that tip them off about every crime committed and tourist trapped on the island. But will all the gadgets and games be enough when not one but three rival crews of con artists come to hold a top-secret gang summit? And when one of them is murdered, who will solve the crime? Inspired by author Rick Dakan's own eventful experiences in the video game and comic book industries, the Geek Mafia series satisfies the hunger in all of us to buck the system, take revenge on corporate America, and live a life of excitement and adventure.

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Diary of a Foreign Minister


Bob Carr - 2014
    And they all unfold against the gripping, uncertain domestic backdrop of Labor Party infighting, plummeting polls and a leadership change from Gillard back to Rudd.

The Edge of Disaster: Rebuilding a Resilient Nation


Stephen Flynn - 2007
    We have learned little from the cataclysms of September 11 and Hurricane Katrina. When it comes to catastrophe, America is living on borrowed time-and squandering it. In this new book, leading security expert Stephen Flynn issues a call to action, demanding that we wake up and prepare immediately for a safer future. The truth is acts of terror cannot always be prevented, and nature continues to show its fury in frighteningly unpredictable ways. Resiliency, argues Flynn, must now become our national motto. With chilling frankness and clarity, Flynn paints an all too real scenario of the threats we face within our own borders. A terrorist attack on a tanker carrying liquefied natural gas into Boston Harbor could kill thousands and leave millions more of New Englanders without power or heat. The destruction of a ship with a cargo of oil in Long Beach, California, could bring the West Coast economy to its knees and endanger the surrounding population. But even these all-too-plausible terrorist scenarios pale in comparison to the potential destruction wrought by a major earthquake or hurricane. Our growing exposure to man-made and natural perils is largely rooted in our own negligence, as we take for granted the infrastructure handed down to us by earlier generations. Once the envy of the world, this infrastructure is now crumbling. After decades of neglect, our public health system leaves us at the mercy of microbes that could kill millions in the next flu pandemic. Flash flooding could wipe out a fifty-year-old dam north of Phoenix, placing thousands of homes and lives at risk. The next San Francisco earthquake could destroy century-old levees, contaminating the freshwater supply that most of California relies on for survival. It doesn't have to be this way. "The Edge of Disaster "tells us what we can do about it, as individuals and as a society. We can-and, Flynn argues, we must-construct a more resilient nation. With the wounds of recent national tragedies still unhealed, the time to act is now. Flynn argues that by tackling head-on, eyes open the perils that lie before us, we can remain true to our most important and endearing national trait: our sense of optimism about the future and our conviction that we can change it for the better for ourselves-and our children. "Steve Flynn offers the answer not only to protecting America from terrorist attacks and natural disaster but also to revitalizing our democracy. This book is a must-read for all members of Congress, 2008 presidential candidates, and ordinary citizens who want to build a better and safer future."-Anne-Marie Slaughter, dean, Woodrow Wilson School of Public and International Affairs, Princeton University Advance praise for "The Edge of Disaster" "Steve Flynn has done it again. Like America the Vulnerable before it, "The Edge of Disaster" is the must-read book for every American, elected official, and presidential candidate who is committed to ensuring that our nation continue to thrive in perilous times."-Mark Warner, former governor of Virginia "Since 9/11, protecting our nation against a terrorist attack has consumed policy makers in Washington. What Stephen Flynn points out in The Edge of Disaster is that much of this effort has been directed overseas, often at the expense of our homeland and its much more likely areas of vulnerability. Laying out a series of potential disasters both manmade and natural, Flynn calls for a greater emphasis on preparedness and the ability of communities and the nation to recover. Painting an often frustrating and infuriating picture of missed opportunities, "The Edge of Disaster "is a call to action. The time to act is now. We can only hope that policy makers are listening." -Christine Todd Whitman, former governor of New Jersey and former administrator, Environmental Protection Agency (2001-03) "Steve Flynn's book makes the very persuasive argument that national security preparedness is linked to natural disaster preparedness. By investing significantly in our critical infrastructure, in citizen preparedness, and most importantly in leadership, we can be better prepared for all hazards. A great book that I highly recommend." -James Lee Witt, former director, Federal Emergency Management Agency "Steve Flynn has become a relentless contributor to the dialogue on prioritizing the work of the post-9/11 security environment. "The Edge of Disaster" calls into question the neglect of domestic preparedness in favor of the Department of Defense-driven offensive in the global war on terrorism. The book offers provocative challenges to both our elected and our private-sector leaders, and both should read it thoroughly." -Admiral James M. Loy, former commandant, U.S. Coast Guard, and former deputy secretary of homeland security