Corey Nachreiner and I (both CISSPs) have created another pair of videos
for our "Malware Analysis" series.
These are supposed to go exclusively to LiveSecurity subscribers, but we
like to share them freely with the CISSP group.
In Part 1, we used a weaponized rootkit, Hacker Defender, to explain
about rootkits in general, and to show how a hacker configures a rootkit
and what it hides.
Running time, about 13 minutes.
In Part 2, we explain what "hooking" is and show how a rootkit can use
inline function hooking to create a backdoor.
Running time, about 9 minutes.
No remediation steps are offered in these videos, but you still might
find them useful in training other members of your staff. If you find
them helpful, feel free to download and use them. As ever, we'd love to
know what you think of them.
They are "unlisted" on Google Video, so you can find them only with
This is our gift to fellow CISSPs; please use discretion in sharing the
D. Scott Pinzon, CISSP, NSA-IAM