๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Malware Forensics: Investigating and Analyzing Malicious Code

โœ Scribed by Cameron H. Malin, Eoghan Casey, James M. Aquilina


Publisher
Syngress
Year
2008
Tongue
English
Leaves
692
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics. Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, Malware Forensics: Investigating and Analyzing Malicious Code emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. * Winner of Best Book Bejtlich read in 2008! * http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html * Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader. * First book to detail how to perform "live forensic" techniques on malicous code. * In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter


๐Ÿ“œ SIMILAR VOLUMES


Malware Forensics: Investigating and Ana
โœ Cameron H. Malin, Eoghan Casey, James M. Aquilina ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Syngress ๐ŸŒ English

<i>Malware Forensics: Investigating and Analyzing Malicious Code</i> covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that dis

Malware: Fighting Malicious Code
โœ Ed Skoudis, Lenny Zeltser ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall ๐ŸŒ English

Great book explaining all the different types of malware out there. Skoudis helps to understand the technical details of each malware type without going into too much detail. The links provided, altough a few years old, are all still relevant.

Malware: Fighting Malicious Code
โœ Ed Skoudis, Lenny Zeltser ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall PTR ๐ŸŒ English

Keep control of your systems out of the hands of unknown attackersIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degr

Malware: Fighting Malicious Code
โœ Ed Skoudis ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Prentice Hall ๐ŸŒ English

Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. For example, it can delete sensitive configuration files from your hard drive, rendering your computer completely inoperable; infect your computer and use it as a jump

Learning Malware Analysis: Explore the c
โœ Monnappa K A ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

Understand malware analysis and its practical implementation Key Features โ€ข Explore the key concepts of malware analysis and memory forensics using real-world examples โ€ข Learn the art of detecting, analyzing, and investigating malware threats โ€ข Understand adversary tactics and techniques Bo