Preface
misinformation to the forensic analyst. In this part of the book, I look at root-
kit tactics that attackers have used in the past both to deny information to the
opposition at run time and to allay the responder's suspicions that something
may be wrong.
Part IV: Summation
If you're going to climb a mountain, you might as well take a few moments
to enjoy the view from the peak. In this final part, I step back from the minuĀ¬
tiae of rootkits to view the subject from 10,000 feet. For the average forensic
investigator, hindered by institutional forces and limited resources, I'm sure
the surrounding landscape looks pretty bleak. In an effort to offer a ray of
hope to these beleaguered White Hats perched with us on the mountain's
summit, I end the book by discussing general strategies to counter the danger
posed by an attacker and the concealment measures he or she uses.
It's one thing to point out the shortcomings of a technology (heck, that's
easy). It's another thing to acknowledge these issues and then search for
constructive solutions that realistically address them. This is the challenge
of being a White Hat. We have the unenviable task of finding ways to plug
the holes that the Black Hats exploit to make our lives miserable. I feel your
pain, brother!
4 Audience
Almost 20 years ago, when I was in graduate school, a crusty old CEO from
a local bank in Cleveland confided in me that "MB As come out of business
school thinking that they know everything." The same could be said for any
training program, where students rnistakenly assume that the textbooks they
read and the courses they complete will cover all of the contingencies that
they'll face in the wild. Anyone who's been out in the held knows that this
simply isn't achievable. Experience is indispensable and impossible to repliĀ¬
cate within the confines of academia.
Another sad truth is that vendors often have a vested interest in overselling
the efficacy of their products. "We've found the cure," proudly proclaims
the marketing literature. I mean, who's going to ask a customer to shell out
$100,000 for the latest whiz-bang security suite and then stipulate that they
still can't have peace of mind?
In light of these truisms, this book is aimed at the current batch of security
professionals entering the industry. My goal is to encourage them to under-
xxviii