Jump to ratings and reviews
Rate this book

Rootkits Subverting the Windows Kernel [PB,2005]

Rate this book
"Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the worlds leading experts have written the first comprehensive guide to what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. Using extensive downloadable examples, they teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers.After reading this book, readers will be able toUnderstand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks Visit rootkit.com for code and programs from this book. The site also contains enhancements to the book's text, such as up-to-the-minute information on rootkits available nowhere else."

Unknown Binding

First published July 22, 2005

12 people are currently reading
326 people want to read

About the author

Greg Hoglund

11 books3 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
64 (39%)
4 stars
62 (37%)
3 stars
32 (19%)
2 stars
4 (2%)
1 star
2 (1%)
Displaying 1 - 6 of 6 reviews
Profile Image for Tyler.
63 reviews3 followers
December 21, 2011
A fantastic book detailing the ins and outs of windows rootkits. If you are interested in the details surrounding topics such as kernel hooks, DKOM, and process hiding, this is the best book on the market today.
Profile Image for Acc13.
73 reviews7 followers
February 20, 2015
Probably due for an update; but still great info.

Very informative.

Probably those who have already done some Windows driver coding can skip the chapters on layered drivers, or sending raw TCP packets from kernel level; but the table hooks, inline patches, evasion, etc. was very interesting.

Recommended for those new to rootkits, but with some coding experience.
Profile Image for James.
135 reviews
March 12, 2009
They don't all work. But it gives a great overview of what a backdoor does and how it does it. This is ancient history by now, but the principles are good. Scares the heck out the reader, too. Best horror book I've read so far this year.
Profile Image for Matty.
7 reviews4 followers
Currently reading
April 3, 2012
The 1st chapter has a great overview of key elements in software attacks. Nice start for a security nüb like myself.
Profile Image for Ben Holland.
7 reviews3 followers
June 22, 2015
The content is a bit outdated now and the supporting materials online are gone (even from the internet archives).
Profile Image for Charlie.
585 reviews3 followers
January 28, 2017
explanations and sample code of how to write and detect rootkits
Displaying 1 - 6 of 6 reviews

Can't find what you're looking for?

Get help and learn more about the design.