"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail.
This is a nice book. It is not a cookbook of code. It's a very broad book with very different and concurrent perspectives on the matter. Malware is definetly a very deep computer area that go deep into the core of operative systems. In this book it is also overviewed the social aspects of malware dissemination and the general human factor on the sucessful exploit of black hats iniciatives. Technically here you can see how System Service Descriptor Table (SSDT), import address table (IAT), and Direct Kernel Object Manipulation (DKOM) can be used in a rootkit to fool an entire system and, conversly as a kernel module as a anti virus subsystem to do the reverse. Beside all these core data structures you'll be introduced also into some key techniques used to inject and detour native calls, replacing of entries on those tables as inline detouring are also some of the topics that are assessed on this book. For those of you who are (like me) more interested on the kinky code you have an entire Appendix with some snippets of the most important parts of code.
An in depth explanation about Malwares, Viruses, and Rootkits though the "How it works" part was not totally exposed. Malwares, Viruses, and Rootkits are very deep topics of the internet security space and this book is a great resource for those who want to learn interesting things like this. The book covers an in depth explanation of Windows OS while only few for Unix and Linux.
Well written and highly informative book. Learn the key concepts of malware and how kernel hooking works. Definitely learned a ton of things. Probably the book is a bit outdated although similar techniques are still used today.