Jump to ratings and reviews
Rate this book

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions

Rate this book
The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail.

Counter today’s most virulent network attack types Find out how malware infects, survives, and propagates across an enterprise Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Learn how hackers use archivers, encryptors, and packers to obfuscate code Defend against keylogging, redirect, click fraud, and identity theft threats

613 pages, Kindle Edition

First published June 1, 2008

14 people are currently reading
110 people want to read

About the author

Michael A. Davis

2 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
23 (41%)
4 stars
18 (32%)
3 stars
12 (21%)
2 stars
2 (3%)
1 star
0 (0%)
Displaying 1 - 6 of 6 reviews
Profile Image for Balhau.
59 reviews5 followers
March 4, 2014
This is a nice book. It is not a cookbook of code. It's a very broad book with very different and concurrent perspectives on the matter. Malware is definetly a very deep computer area that go deep into the core of operative systems. In this book it is also overviewed the social aspects of malware dissemination and the general human factor on the sucessful exploit of black hats iniciatives. Technically here you can see how System Service Descriptor Table (SSDT), import address table (IAT), and Direct Kernel Object Manipulation (DKOM) can be used in a rootkit to fool an entire system and, conversly as a kernel module as a anti virus subsystem to do the reverse. Beside all these core data structures you'll be introduced also into some key techniques used to inject and detour native calls, replacing of entries on those tables as inline detouring are also some of the topics that are assessed on this book.
For those of you who are (like me) more interested on the kinky code you have an entire Appendix with some snippets of the most important parts of code.
Profile Image for Aiman Adlawan.
123 reviews3 followers
April 7, 2019
An in depth explanation about Malwares, Viruses, and Rootkits though the "How it works" part was not totally exposed. Malwares, Viruses, and Rootkits are very deep topics of the internet security space and this book is a great resource for those who want to learn interesting things like this. The book covers an in depth explanation of Windows OS while only few for Unix and Linux.
Profile Image for pandapoo.
24 reviews
May 1, 2020
Well written and highly informative book. Learn the key concepts of malware and how kernel hooking works. Definitely learned a ton of things. Probably the book is a bit outdated although similar techniques are still used today.
Profile Image for Mark.
32 reviews
August 17, 2012
Very good and in depth but lacks sufficient coverage of unix/Linux.
1 review
January 29, 2016
this is very nice book i want to read it up to end and this is very usfull book for all new students thamk you sir for this nice book...
14 reviews1 follower
February 23, 2025
Perfect for starters. You will likely end up searching a lot more on MSDN for in-depth understanding, but this book summaries everything very well.
Displaying 1 - 6 of 6 reviews

Can't find what you're looking for?

Get help and learn more about the design.