Book

Rootkits and Bootkits

📖 Overview

Rootkits and Bootkits examines the technical underpinnings of malware that targets system boot processes and firmware. The book provides a comprehensive analysis of threats to the boot process across multiple architectures and platforms. The authors present detailed technical information about rootkit and bootkit implementation, detection, and defense through practical examples and case studies. The material progresses from fundamental concepts to advanced techniques used by real-world malware. Each chapter contains hands-on exercises and code samples that demonstrate key concepts in firmware and boot security. The text covers topics including UEFI firmware analysis, Windows boot process manipulation, and hardware-level rootkit persistence. This work serves as both a reference guide for security professionals and a warning about evolving firmware-level threats. The authors make a case for improved security practices and defensive measures at the lowest levels of modern computing systems.

👀 Reviews

Readers describe this as a deep technical reference on low-level system security, with detailed coverage of rootkit techniques and countermeasures. Multiple reviewers note it requires significant prior knowledge of assembly, operating systems, and hardware architecture. Likes: - Clear diagrams and code examples - Technical depth on Windows and UEFI internals - Historical examples of real-world rootkits - Practical defensive strategies Dislikes: - Advanced content inaccessible to beginners - Some sections need better explanations - Price considered high by several readers - A few readers wanted more Linux/macOS coverage Ratings: Amazon: 4.6/5 (89 ratings) Goodreads: 4.4/5 (54 ratings) Notable review: "Not for the faint of heart. Deep technical content that assumes you already understand OS internals and assembly. The historical examples and defensive sections make it worthwhile for security professionals." - Amazon reviewer

📚 Similar books

Practical Malware Analysis by Michael Sikorski Provides hands-on techniques for dissecting malicious code with a focus on Windows-based malware analysis, complementing rootkit investigation skills.

The Rootkit Arsenal by Bill Blunden Explores the technical mechanisms of system manipulation through kernel-level code modifications and stealth techniques.

Windows Internals by Pavel Yosifovich, Alex Ionescu, Mark E. Russinovich, and David A. Solomon Presents the core Windows operating system architecture and internal mechanisms that rootkits target for exploitation.

The Art of Memory Forensics by Michael Hale Ligh, Andrew Case, Jamie Levy, and AAron Walters Examines memory analysis techniques for uncovering hidden threats and malware artifacts in system memory.

Intel 64 and IA-32 Architectures Software Developer's Manual by Intel Corporation Details the processor architecture and system programming concepts that form the foundation for understanding low-level malware and bootkit operations.

🤔 Interesting facts

🔐 The book covers one of the most sophisticated bootkits ever discovered - the Thunderstrike attack, which could infect Apple Macs at the firmware level and survive complete operating system reinstallation. ⚡ Author Alex Matrosov previously worked as a senior security researcher at Intel, where he discovered critical vulnerabilities in Intel Boot Guard technology. 🖥️ The techniques described in the book helped identify malware like LoJax - the first known UEFI rootkit used in the wild by a nation-state hacking group. 🔬 Co-author Eugene Rodionov developed methods to detect and analyze TDL3/TDL4, some of the most sophisticated bootkits ever found in the wild, which infected millions of computers. 💻 The book explains how the Stuxnet worm, which targeted Iranian nuclear facilities, used rootkit techniques to hide its presence while causing centrifuges to malfunction.