Uninformed: Informative Information for the Uninformed

Vol 3» 2006.Jan


Bibliography

1
Conover, Matt. Malware Profiling and Rootkit Detection on Windows.

http://xcon.xfocus.org/archives/2005/Xcon2005_Shok.pdf; accessed Dec. 12, 2005.

2
eEye Digital Security. Remote Windows Kernel Exploitation: Step into the Ring 0.

http://www.eeye.com/~data/publish/whitepapers/research/OT20050205.FILE.pdf; accessed Dec. 8, 2005.

3
skape. Safely Searching Process Virtual Address Space.

http://www.hick.org/code/skape/papers/egghunt-shellcode.pdf; accessed Dec. 12, 2005.

4
SoBeIt. How to Exploit Windows Kernel Memory Pool.

http://packetstormsecurity.nl/Xcon2005/Xcon2005_SoBeIt.pdf; accessed Dec. 11, 2005.

5
System Inside. Sysenter.

http://system-inside.com/driver/sysenter/sysenter.html; accessed Nov. 23, 2005.