Jump to ratings and reviews
Rate this book

Hacking Exposed: Malware & Rootkits Secrets & Solutions

Rate this book
"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.

400 pages, Paperback

First published June 1, 2008

14 people are currently reading
111 people want to read

About the author

Michael A. Davis

2 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
23 (41%)
4 stars
18 (32%)
3 stars
12 (21%)
2 stars
2 (3%)
1 star
0 (0%)
Displaying 1 - 6 of 6 reviews
Profile Image for Balhau.
59 reviews5 followers
March 4, 2014
This is a nice book. It is not a cookbook of code. It's a very broad book with very different and concurrent perspectives on the matter. Malware is definetly a very deep computer area that go deep into the core of operative systems. In this book it is also overviewed the social aspects of malware dissemination and the general human factor on the sucessful exploit of black hats iniciatives. Technically here you can see how System Service Descriptor Table (SSDT), import address table (IAT), and Direct Kernel Object Manipulation (DKOM) can be used in a rootkit to fool an entire system and, conversly as a kernel module as a anti virus subsystem to do the reverse. Beside all these core data structures you'll be introduced also into some key techniques used to inject and detour native calls, replacing of entries on those tables as inline detouring are also some of the topics that are assessed on this book.
For those of you who are (like me) more interested on the kinky code you have an entire Appendix with some snippets of the most important parts of code.
Profile Image for Aiman Adlawan.
123 reviews3 followers
April 7, 2019
An in depth explanation about Malwares, Viruses, and Rootkits though the "How it works" part was not totally exposed. Malwares, Viruses, and Rootkits are very deep topics of the internet security space and this book is a great resource for those who want to learn interesting things like this. The book covers an in depth explanation of Windows OS while only few for Unix and Linux.
Profile Image for pandapoo.
24 reviews
May 1, 2020
Well written and highly informative book. Learn the key concepts of malware and how kernel hooking works. Definitely learned a ton of things. Probably the book is a bit outdated although similar techniques are still used today.
Profile Image for Mark.
32 reviews
August 17, 2012
Very good and in depth but lacks sufficient coverage of unix/Linux.
1 review
January 29, 2016
this is very nice book i want to read it up to end and this is very usfull book for all new students thamk you sir for this nice book...
14 reviews1 follower
February 23, 2025
Perfect for starters. You will likely end up searching a lot more on MSDN for in-depth understanding, but this book summaries everything very well.
Displaying 1 - 6 of 6 reviews

Can't find what you're looking for?

Get help and learn more about the design.