Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Buy

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand adversary tactics and techniques

Book Description

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.

This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics.

This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.

What you will learn

  • Create a safe and isolated lab environment for malware analysis
  • Extract the metadata associated with malware
  • Determine malware's interaction with the system
  • Perform code analysis using IDA Pro and x64dbg
  • Reverse-engineer various malware functionalities
  • Reverse engineer and decode common encoding/encryption algorithms
  • Perform different code injection and hooking techniques
  • Investigate and hunt malware using memory forensics

Who This Book Is For

This book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you'll be able to get the most out of this book.

Table of Contents

  1. Introduction to Malware Analysis
  2. Static Analysis
  3. Dynamic Analysis
  4. Assembly Language and Disassembly Primer
  5. Disassembly Using IDA
  6. Debugging Malicious Binaries
  7. Malware Functionalities and Persistence
  8. Code Injection and Hooking
  9. Malware Obfuscation Techniques
  10. Hunting Malware Using Memory Forensics
  11. Detecting Advanced Malware Using Memory Forensics
(HTML tags aren't allowed.)

Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure
Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure

Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged.  At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers.  Now, however, the traditional framework...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
CliffsNotes Making Microsoft Windows Me Work For You
CliffsNotes Making Microsoft Windows Me Work For You
What you need to know now When it comes to pinpointing the stuff you really need to know, nobody does it better than CliffsNotes. Packed with time-saving tips, tricks, and techniques, this no-nonsense guide delivers the practical know-how you need to get up and running fast on Windows Me. CliffsNotes. They helped you get through school. Now let...

Follicular Lymphoma: Current Management and Novel Approaches
Follicular Lymphoma: Current Management and Novel Approaches
This book provides a comprehensive, state-of-the-art overview of follicular lymphoma. The first section of the text explores the current understanding of the biology and pathogenesis of follicular lymphoma, through reviewing recent changes in the WHO classification of low-grade lymphomas, current diagnostic techniques, and emerging...
Professional Application Lifecycle Management with Visual Studio 2012
Professional Application Lifecycle Management with Visual Studio 2012
OVER THE LAST FIFTEEN YEARS, Microsoft’s software development tooling has matured to address not only the needs of a lone programmer, but the needs of an entire software development team. This includes business analysts, project managers, architects, testers, programmers, managers, stakeholders, and even operations personnel...
Cocos2d-X Game Development Blueprints
Cocos2d-X Game Development Blueprints

Build a plethora of games for various genres using one of the most powerful game engines, Cocos2d-x

About This Book

  • Explore the powerful features of Cocos2d-x and use them to your advantage
  • Tackle commonly faced problems while creating popular 2D games
  • A step-by-step guide...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy