- Page 3:
The Antivirus Hacker’s Handbook
- Page 6 and 7:
The Antivirus Hacker’s Handbook P
- Page 9:
Credits Project Editor Sydney Argen
- Page 13 and 14:
Contents at a Glance Introduction x
- Page 15 and 16:
Contents Introduction xix Part I An
- Page 17 and 18:
Contents xv Chapter 5 The Update Sy
- Page 19 and 20:
Contents xvii Part III Analysis and
- Page 21 and 22:
Introduction Welcome to The Antivir
- Page 23 and 24: Introduction xxi ■ Chapter 9, “
- Page 25: Part I Antivirus Basics In This Par
- Page 28 and 29: 4 Part I ■ Antivirus Basics AV so
- Page 30 and 31: 6 Part I ■ Antivirus Basics ClamA
- Page 32 and 33: 8 Part I ■ Antivirus Basics case
- Page 34 and 35: 10 Part I ■ Antivirus Basics Unpa
- Page 36 and 37: 12 Part I ■ Antivirus Basics Beca
- Page 38 and 39: 14 Part I ■ Antivirus Basics ■
- Page 40 and 41: 16 Part I ■ Antivirus Basics and
- Page 42 and 43: 18 Part I ■ Antivirus Basics Figu
- Page 44 and 45: 20 Part I ■ Antivirus Basics Figu
- Page 46 and 47: 22 Part I ■ Antivirus Basics a ba
- Page 48 and 49: 24 Part I ■ Antivirus Basics To p
- Page 50 and 51: 26 Part I ■ Antivirus Basics .sym
- Page 52 and 53: 28 Part I ■ Antivirus Basics NOTE
- Page 54 and 55: 30 Part I ■ Antivirus Basics Figu
- Page 56 and 57: 32 Part I ■ Antivirus Basics It i
- Page 58 and 59: 34 Part I ■ Antivirus Basics You
- Page 60 and 61: 36 Part I ■ Antivirus Basics When
- Page 62 and 63: 38 Part I ■ Antivirus Basics .tex
- Page 64 and 65: 40 Part I ■ Antivirus Basics The
- Page 66 and 67: 42 Part I ■ Antivirus Basics pthr
- Page 68 and 69: 44 Part I ■ Antivirus Basics This
- Page 70 and 71: 46 Part I ■ Antivirus Basics #inc
- Page 72 and 73: 48 Part I ■ Antivirus Basics { er
- Page 76 and 77: 52 Part I ■ Antivirus Basics int
- Page 78 and 79: 54 Part I ■ Antivirus Basics } }
- Page 80 and 81: 56 Part I ■ Antivirus Basics same
- Page 82 and 83: 58 Part I ■ Antivirus Basics Unde
- Page 84 and 85: 60 Part I ■ Antivirus Basics The
- Page 86 and 87: 62 Part I ■ Antivirus Basics time
- Page 88 and 89: 64 Part I ■ Antivirus Basics Othe
- Page 90 and 91: 66 Part I ■ Antivirus Basics Heur
- Page 92 and 93: 68 Part I ■ Antivirus Basics If t
- Page 94 and 95: 70 Part I ■ Antivirus Basics can
- Page 96 and 97: 72 Part I ■ Antivirus Basics 1. D
- Page 98 and 99: 74 Part I ■ Antivirus Basics valu
- Page 101 and 102: CHAPTER 4 Understanding Antivirus S
- Page 103 and 104: Chapter 4 ■ Understanding Antivir
- Page 105 and 106: Chapter 4 ■ Understanding Antivir
- Page 107 and 108: Chapter 4 ■ Understanding Antivir
- Page 109 and 110: Chapter 4 ■ Understanding Antivir
- Page 111 and 112: CHAPTER 5 The Update System Antivir
- Page 113 and 114: Chapter 5 ■ The Update System 89
- Page 115 and 116: Chapter 5 ■ The Update System 91
- Page 117 and 118: Chapter 5 ■ The Update System 93
- Page 119 and 120: Chapter 5 ■ The Update System 95
- Page 121 and 122: Chapter 5 ■ The Update System 97
- Page 123 and 124: Chapter 5 ■ The Update System 99
- Page 125:
Chapter 5 ■ The Update System 101
- Page 129 and 130:
CHAPTER 6 Antivirus Software Evasio
- Page 131 and 132:
Chapter 6 ■ Antivirus Software Ev
- Page 133 and 134:
Chapter 6 ■ Antivirus Software Ev
- Page 135 and 136:
Chapter 6 ■ Antivirus Software Ev
- Page 137 and 138:
Chapter 6 ■ Antivirus Software Ev
- Page 139:
Chapter 6 ■ Antivirus Software Ev
- Page 142 and 143:
118 Par t II ■ Antivirus Software
- Page 144 and 145:
120 Part II ■ Antivirus Software
- Page 146 and 147:
122 Part II ■ Antivirus Software
- Page 148 and 149:
124 Part II ■ Antivirus Software
- Page 150 and 151:
126 Part II ■ Antivirus Software
- Page 152 and 153:
128 Part II ■ Antivirus Software
- Page 154 and 155:
130 Part II ■ Antivirus Software
- Page 156 and 157:
132 Part II ■ Antivirus Software
- Page 158 and 159:
134 Part II ■ Antivirus Software
- Page 160 and 161:
136 Part II ■ Antivirus Software
- Page 162 and 163:
138 Part II ■ Antivirus Software
- Page 164 and 165:
140 Part II ■ Antivirus Software
- Page 166 and 167:
142 Part II ■ Antivirus Software
- Page 168 and 169:
144 Part II ■ Antivirus Software
- Page 170 and 171:
146 Part II ■ Antivirus Software
- Page 172 and 173:
148 Part II ■ Antivirus Software
- Page 174 and 175:
150 Part II ■ Antivirus Software
- Page 176 and 177:
152 Part II ■ Antivirus Software
- Page 178 and 179:
154 Part II ■ Antivirus Software
- Page 180 and 181:
156 Part II ■ Antivirus Software
- Page 182 and 183:
158 Part II ■ Antivirus Software
- Page 184 and 185:
160 Part II ■ Antivirus Software
- Page 186 and 187:
162 Part II ■ Antivirus Software
- Page 189 and 190:
CHAPTER 9 Evading Heuristic Engines
- Page 191 and 192:
Chapter 9 ■ Evading Heuristic Eng
- Page 193 and 194:
Chapter 9 ■ Evading Heuristic Eng
- Page 195 and 196:
Chapter 9 ■ Evading Heuristic Eng
- Page 197 and 198:
Chapter 9 ■ Evading Heuristic Eng
- Page 199 and 200:
Chapter 9 ■ Evading Heuristic Eng
- Page 201 and 202:
Chapter 9 ■ Evading Heuristic Eng
- Page 203 and 204:
Chapter 9 ■ Evading Heuristic Eng
- Page 205:
Chapter 9 ■ Evading Heuristic Eng
- Page 208 and 209:
184 Part II ■ Antivirus Software
- Page 210 and 211:
186 Part II ■ Antivirus Software
- Page 212 and 213:
188 Part II ■ Antivirus Software
- Page 214 and 215:
190 Part II ■ Antivirus Software
- Page 216 and 217:
192 Part II ■ Antivirus Software
- Page 218 and 219:
194 Part II ■ Antivirus Software
- Page 220 and 221:
196 Part II ■ Antivirus Software
- Page 222 and 223:
198 Part II ■ Antivirus Software
- Page 224 and 225:
200 Part II ■ Antivirus Software
- Page 226 and 227:
202 Part II ■ Antivirus Software
- Page 228 and 229:
204 Part II ■ Antivirus Software
- Page 231 and 232:
CHAPTER 11 Denial of Service Both l
- Page 233 and 234:
Chapter 11 ■ Denial of Service 20
- Page 235 and 236:
Chapter 11 ■ Denial of Service 21
- Page 237 and 238:
Chapter 11 ■ Denial of Service 21
- Page 239 and 240:
Chapter 11 ■ Denial of Service 21
- Page 241:
Part III Analysis and Exploitation
- Page 244 and 245:
220 Part III ■ Analysis and Explo
- Page 246 and 247:
222 Part III ■ Analysis and Explo
- Page 248 and 249:
224 Part III ■ Analysis and Explo
- Page 250 and 251:
226 Part III ■ Analysis and Explo
- Page 252 and 253:
228 Part III ■ Analysis and Explo
- Page 254 and 255:
230 Part III ■ Analysis and Explo
- Page 256 and 257:
232 Part III ■ Analysis and Explo
- Page 259 and 260:
CHAPTER 13 Dynamic Analysis Dynamic
- Page 261 and 262:
Chapter 13 ■ Dynamic Analysis 237
- Page 263 and 264:
Chapter 13 ■ Dynamic Analysis 239
- Page 265 and 266:
Chapter 13 ■ Dynamic Analysis 241
- Page 267 and 268:
Chapter 13 ■ Dynamic Analysis 243
- Page 269 and 270:
Chapter 13 ■ Dynamic Analysis 245
- Page 271 and 272:
Chapter 13 ■ Dynamic Analysis 247
- Page 273 and 274:
Chapter 13 ■ Dynamic Analysis 249
- Page 275 and 276:
Chapter 13 ■ Dynamic Analysis 251
- Page 277 and 278:
Chapter 13 ■ Dynamic Analysis 253
- Page 279 and 280:
Chapter 13 ■ Dynamic Analysis 255
- Page 281 and 282:
Chapter 13 ■ Dynamic Analysis 257
- Page 283 and 284:
Chapter 13 ■ Dynamic Analysis 259
- Page 285 and 286:
Chapter 13 ■ Dynamic Analysis 261
- Page 287 and 288:
Chapter 13 ■ Dynamic Analysis 263
- Page 289 and 290:
Chapter 13 ■ Dynamic Analysis 265
- Page 291:
Chapter 13 ■ Dynamic Analysis 267
- Page 294 and 295:
270 Part III ■ Analysis and Explo
- Page 296 and 297:
272 Part III ■ Analysis and Explo
- Page 298 and 299:
274 Part III ■ Analysis and Explo
- Page 300 and 301:
276 Part III ■ Analysis and Explo
- Page 302 and 303:
278 Part III ■ Analysis and Explo
- Page 304 and 305:
280 Part III ■ Analysis and Explo
- Page 306 and 307:
282 Part III ■ Analysis and Explo
- Page 308 and 309:
284 Part III ■ Analysis and Explo
- Page 310 and 311:
286 Part III ■ Analysis and Explo
- Page 312 and 313:
288 Part III ■ Analysis and Explo
- Page 314 and 315:
290 Part III ■ Analysis and Explo
- Page 316 and 317:
292 Part III ■ Analysis and Explo
- Page 318 and 319:
294 Part III ■ Analysis and Explo
- Page 320 and 321:
296 Part III ■ Analysis and Explo
- Page 322 and 323:
298 Part III ■ Analysis and Explo
- Page 324 and 325:
300 Part III ■ Analysis and Explo
- Page 326 and 327:
302 Part III ■ Analysis and Explo
- Page 328 and 329:
304 Part III ■ Analysis and Explo
- Page 330 and 331:
306 Part III ■ Analysis and Explo
- Page 332 and 333:
308 Part III ■ Analysis and Explo
- Page 334 and 335:
310 Part III ■ Analysis and Explo
- Page 336 and 337:
312 Part III ■ Analysis and Explo
- Page 338 and 339:
314 Part III ■ Analysis and Explo
- Page 340 and 341:
316 Part III ■ Analysis and Explo
- Page 342 and 343:
318 Part III ■ Analysis and Explo
- Page 345:
Part IV Current Trends and Recommen
- Page 348 and 349:
324 Part IV ■ Current Trends and
- Page 350 and 351:
326 Part IV ■ Current Trends and
- Page 352 and 353:
328 Part IV ■ Current Trends and
- Page 355 and 356:
CHAPTER 17 Recommendations and the
- Page 357 and 358:
Chapter 17 ■ Recommendations and
- Page 359 and 360:
Chapter 17 ■ Recommendations and
- Page 361 and 362:
Chapter 17 ■ Recommendations and
- Page 363 and 364:
Chapter 17 ■ Recommendations and
- Page 365 and 366:
Chapter 17 ■ Recommendations and
- Page 367 and 368:
Chapter 17 ■ Recommendations and
- Page 369 and 370:
Chapter 17 ■ Recommendations and
- Page 371 and 372:
Index %PDF-1.X magic string, 148 22
- Page 373 and 374:
Index ■ C-C 349 BSOD (blue screen
- Page 375 and 376:
Index ■ E-F 351 DynamoRIO (binary
- Page 377 and 378:
Index ■ J-L 353 finding weaknesse
- Page 379 and 380:
Index ■ O-P 355 network services,
- Page 381 and 382:
Index ■ S-S 357 exploiting weakne
- Page 383 and 384:
Index ■ W-Z 359 Virut virus, 336