

Buy anything from 5,000+ international stores. One checkout price. No surprise fees. Join 2M+ shoppers on Desertcart.
Desertcart purchases this item on your behalf and handles shipping, customs, and support to Nicaragua.
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity [Zhussupov, Zhassulan] on desertcart.com. *FREE* shipping on qualifying offers. Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity Review: Pristine - Item arrived on time and was in great condition. The pages are clean and unmarked it looks like it was freshly printed. Will be ordering again from the seller. Review: great for beginner and professional red teamers - I'm a pentester and thought this book was a great overview of malware development. there isn't enough room in one book to deep dive into every topic, but the course material lays a solid foundation for anyone looking to begin their journey in adversarial simulation or enhance their current abilities. it also has chapters on the modern malware dev ecosystem and what red teamers have learned from their capabilities. there is a github with code that the book walks you through. highly recommend!






| Best Sellers Rank | #193,173 in Books ( See Top 100 in Books ) #22 in Computer Viruses #85 in Computer Hacking #199 in Internet & Telecommunications |
| Customer Reviews | 4.5 4.5 out of 5 stars (30) |
| Dimensions | 7.5 x 0.91 x 9.25 inches |
| ISBN-10 | 1801810176 |
| ISBN-13 | 978-1801810173 |
| Item Weight | 1.52 pounds |
| Language | English |
| Print length | 402 pages |
| Publication date | June 28, 2024 |
| Publisher | Packt Publishing |
C**E
Pristine
Item arrived on time and was in great condition. The pages are clean and unmarked it looks like it was freshly printed. Will be ordering again from the seller.
G**A
great for beginner and professional red teamers
I'm a pentester and thought this book was a great overview of malware development. there isn't enough room in one book to deep dive into every topic, but the course material lays a solid foundation for anyone looking to begin their journey in adversarial simulation or enhance their current abilities. it also has chapters on the modern malware dev ecosystem and what red teamers have learned from their capabilities. there is a github with code that the book walks you through. highly recommend!
S**Y
A Great Guide to Malware Development
I've been pentesting since 2008. In 2019 I developed my first C2 instance and have been interested in this subject matter ever since. The book is well organized and thought out and gives you what I call necessary basics that all beginners and even seasoned experts should know along with deeper topics suited for more seasoned individuals. You do need a pretty decent background in the languages discussed in the book especially C/C++. The code examples are well done which can be rare for books like this and the authors know and understand windows internals really well which is another art all in of itself that is rare to find or even master. The chapters are well thought out and honestly would be the same order that I'd probably put them in if I was writing a book like this. The only thing I did not like about the book which was written in 2024 is the use of Windows 7 and Windows 10 as operating systems in the examples. I would have liked to have seen more Windows 11 and potentially some newer server operating systems used in the book which brings about newer more up to date methods of exploitation, obfuscation and evasion techniques.
W**O
I'm satisfied
I like the book. It has plenty of up-to-date information and actual implementations with links to GitHub. It's easy to understand and easy to read (letters are kinda small but still readable). The material is also good, the cover is matte and feels awesome
A**R
Loved it.
I enjoyed the book it's like art in paper form.
J**S
An excellent book for anyone who wants to learn malware development techniques
"Malware Development for Ethical Hackers" by Zhassulan Zhussupov offers a deep exploration of malware creation, aimed at readers with a strong interest in enhancing their cybersecurity defenses. The book is dense with technical knowledge and practical examples, making it a valuable resource for professionals looking to understand and simulate cyber threats to develop robust countermeasures. Zhussupov's expertise is evident as he covers a variety of topics, from basic malware creation to advanced persistence and evasion techniques. The chapters on Advanced Mathematical Algorithms and Custom Encoding Techniques are particularly impressive, offering a detailed insight that is rarely found in other publications in the field. Furthermore, the discussion on APTs and Cybercrime is enlightening and effectively captures the complexity of modern threats. However, the book is not without its challenges. Beginners may find the content overwhelming due to its technical depth. The book is rich in code examples and detailed descriptions, which helps in understanding the more complex topics. I am looking forward to a second part. Overall, "Malware Development for Ethical Hackers" is a very good book for those already familiar with the field, looking to deepen their expertise in malware analysis and development. I'm looking forward to a part two, as I know the author has a lot to contribute!
M**N
Good for the beginner - intermediate cybersecurity professional
"Malware Development for Ethical Hackers" is a hands-on guide for anyone interested in understanding the inner workings of malware from an ethical perspective. The book begins with an introduction to malware development, covering concepts and tools. It then dives into various attack techniques, including malware injection, persistence, and privilege escalation on Windows systems. As you progress, you'll learn about anti-debugging tricks, anti-virtual machine strategies, and anti-disassembly techniques to strengthen your code. The book also covers how to navigate antivirus systems, use hash algorithms, and implement ciphers. It discusses advanced math algorithms, classic malware examples, and modern threats like ransomware, providing both context and practical insights. This book is a great resource for anyone aiming to deepen their knowledge of malware development.
W**M
Highly Recommended
This is an outstanding resource for anyone looking to excel in cybersecurity. This book delivers comprehensive coverage of malware development, from foundational concepts to advanced tactics like Anti-Debugging and Anti-VM techniques. Zhussupov does an excellent job of making complex topics accessible, with practical examples that make the content immediately applicable. Whether you’re a seasoned professional or an ethical hacker looking to expand your skill set, this book is a must-have. Highly recommended!
J**R
Interessante que se tenha um fundamento em programação, para melhor compreensão do livro. Sabendo o básico, o livro se torna uma arma poderosa.
B**D
I bought the book to see if there's some good explanations of malware tactics and techniques with some OS internals that would be useful from a blue teamer perspective as well. I've several other books that cover those areas. Overall, this book is a complete disappointment. Here are the reasons why: 1. It starts with the well-known basic techniques such as API hooking. However, the description and code examples are terrible, and I've seen far better and clear examples from other resources online and for free. Code snippets were presented in a haphazard way that made little sense even though I knew what the sample was supposed to be trying to achieve. That wasn't a good start. 2. The chapter on 'Strategies for Anti-Disassembly' is a joke. It's about 11 pages with copious amount of screenshots and filler material. Googling would give the reader a much more information. 3. More 'advanced' sections such as 'EDR Bypass' is covered in a page and a half with screenshots included. The section claims to describe how a malware can unhook API calls hooked by an EDR. However, the gist of the sections is: 'download the code from git-hub and study'. There's no explanation of the API unhooking process. 4. In similar vein as above, the whole topic of 'AMSI bypass' was covered in less than two pages and again with zero value. The rest of the book follows the same pattern, and I don't want to drone on. Anyone looking for a book on malware tactics/techniques and related topics would gain zero value from this book. Not to mention that this wasn't a cheap book either.
E**A
Excelente
Trustpilot
Hace 2 semanas
Hace 1 día