A forum for reverse engineering, OS internals and malware analysis 

Ask your beginner questions here.
 #9738  by BillyONeal
 Fri Nov 18, 2011 5:52 am
Hello, all.

Some of you may know me from elsewhere; most of you probably don't. Long story short, I've worked on a few tools, but that's not what I'm here to talk about :). Everything I've done up to this point has been in usermode. I'd like to take things a bit further and to that end I've purchased (and read) what seems to be the only book on the subject, but I've not attempted anything serious as of yet.

If it's alright I'll be digging around and attempting to get my head around some of this stuff soon. Thanks for creating such a resource!

Billy3
 #9739  by a_d_13
 Fri Nov 18, 2011 6:42 am
Hello,

Welcome to KernelMode.info! Greg's book is good, but very out-dated. Most techniques used in modern rootkits are not in the book, for example. Here are some good resource, courtesy of evilcry and rkhunter:

Rootkit Techniques:
http://www.kernelmode.info/forum/viewto ... ?f=2&t=990
http://www.kernelmode.info/forum/viewto ... f=2&t=1159

Driver Development:
http://www.kernelmode.info/forum/viewto ... f=14&t=374
http://www.kernelmode.info/forum/viewto ... f=14&t=995

I also recommend installing Windows on VMWare, setup kernel debugging over COM port / named pipe, and use WinDbg to inspect kernel structures.

Please feel free to post if you have any questions.

Thanks,
--AD
 #9741  by BillyONeal
 Fri Nov 18, 2011 6:54 am
Hello there, AD. :)

Thank you. I'll be sure to take a look. Mostly interested in building a few toy "canary in a coal mine" kind of things, but I suppose one must know how to hide if one is to seek, eh?

Have a nice night,

BIlly3
 #9756  by EP_X0FF
 Sat Nov 19, 2011 11:49 am
@BillyONeal

If you have any specific question, then feel free to ask.
Google translation may result in some sense loss.