📖 Overview
Greg Hoglund is a computer security researcher and author known for his work in rootkit technologies, game hacking, and malware analysis. He founded several influential security companies including HBGary and is recognized as a pioneer in Windows rootkit development and detection.
Hoglund authored multiple seminal books in the field of computer security, including "Rootkits: Subverting the Windows Kernel" and "Exploiting Online Games: Cheating Massively Distributed Systems." His research has focused extensively on reverse engineering, malware behavior, and operating system manipulation.
As a security researcher, Hoglund developed various tools and methodologies for analyzing system security, including the Rootkit Revealer and other forensics utilities. His work has influenced both offensive and defensive security practices, particularly in the areas of stealth malware and anti-cheat systems for online gaming.
His technical contributions and research findings have been presented at major security conferences including Black Hat and DEF CON. Hoglund's expertise spans multiple domains within information security, from low-level kernel manipulation to large-scale network exploitation.
👀 Reviews
Technical professionals consistently praise Hoglund's detailed explanations of complex security concepts. His books serve as practical references for security researchers and developers.
Readers liked:
- Clear code examples and technical depth in "Rootkits"
- Real-world applications and case studies
- Step-by-step explanations of exploitation techniques
- Technical accuracy and attention to detail
Readers disliked:
- Dated examples in older books
- Advanced content can be inaccessible for beginners
- Limited coverage of newer Windows versions
- Some code samples need updates for modern systems
Ratings across platforms:
Goodreads:
- "Rootkits": 4.1/5 (300+ ratings)
- "Exploiting Online Games": 3.9/5 (150+ ratings)
Amazon:
- "Rootkits": 4.3/5 (80+ reviews)
- "Exploiting Online Games": 4.0/5 (40+ reviews)
One security engineer noted: "Hoglund's rootkit book remains the definitive technical guide despite its age." Several readers mentioned the need for updated editions to cover recent Windows versions.
📚 Books by Greg Hoglund
Rootkits: Subverting the Windows Kernel (2005)
Technical guide covering rootkit programming techniques, kernel manipulation, and Windows operating system internals.
Exploiting Software: How to Break Code (2004) Reference manual on software vulnerability assessment, reverse engineering, and exploitation methods.
Exploiting Online Games: Cheating Massively Distributed Systems (2007) Analysis of online game security vulnerabilities and exploitation techniques in multiplayer gaming environments.
Maximum Windows 2000 Security (2001) Technical handbook covering Windows 2000 system security configuration, hardening, and threat mitigation.
Windows NT Security: Step by Step (1999) Systematic guide for implementing security measures and configurations in Windows NT environments.
Exploiting Software: How to Break Code (2004) Reference manual on software vulnerability assessment, reverse engineering, and exploitation methods.
Exploiting Online Games: Cheating Massively Distributed Systems (2007) Analysis of online game security vulnerabilities and exploitation techniques in multiplayer gaming environments.
Maximum Windows 2000 Security (2001) Technical handbook covering Windows 2000 system security configuration, hardening, and threat mitigation.
Windows NT Security: Step by Step (1999) Systematic guide for implementing security measures and configurations in Windows NT environments.
👥 Similar authors
Dan Kaminsky Focuses on network security, DNS security, and vulnerability research. Published research on DNS cache poisoning and worked on core internet infrastructure security.
Dave Aitel Created vulnerability research tools and wrote about exploit development methodologies. Built the SPIKE fuzzing framework and published work on automated vulnerability discovery.
HD Moore Created Metasploit Framework and contributed research on network protocols and exploitation techniques. Published work on vulnerability scanning and automated penetration testing methods.
Thomas Ptacek Researches OS security, cryptography implementation flaws, and network protocol vulnerabilities. Co-founded Matasano Security and developed security testing tools for systems and networks.
Chris Eagle Writes about reverse engineering and low-level software analysis. Created tools for IDA Pro and published work on binary analysis techniques for malware research.
Dave Aitel Created vulnerability research tools and wrote about exploit development methodologies. Built the SPIKE fuzzing framework and published work on automated vulnerability discovery.
HD Moore Created Metasploit Framework and contributed research on network protocols and exploitation techniques. Published work on vulnerability scanning and automated penetration testing methods.
Thomas Ptacek Researches OS security, cryptography implementation flaws, and network protocol vulnerabilities. Co-founded Matasano Security and developed security testing tools for systems and networks.
Chris Eagle Writes about reverse engineering and low-level software analysis. Created tools for IDA Pro and published work on binary analysis techniques for malware research.