<p><span>Learn effective malware analysis tactics to prevent your systems from getting infected</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Investigate cyberattacks and prevent malware-related incidents from occurring in the future</span></span></li><li><span><span>Learn core con
Mastering malware analysis: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and loT attacks
✍ Scribed by Kleymenov, Alexey;Thabet, Amr
- Publisher
- Packt Publishing
- Year
- 2019
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Master malware analysis to protect your systems from getting infectedKey FeaturesSet up and model solutions, investigate malware, and prevent it from occurring in futureLearn core concepts of dynamic malware analysis, memory forensics, decryption, and much moreA practical guide to developing innovative solutions to numerous malware incidentsBook DescriptionWith the ever-growing proliferation of technology, the risk of encountering malicious code or malware has also increased. Malware analysis has become one of the most trending topics in businesses in recent years due to multiple prominent ransomware attacks. Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You will learn how to examine malware code and determine the damage it can possibly cause to your systems to ensure that it won't propagate any further. Moving forward, you will cover all aspects of malware analysis for the Windows platform in detail. Next, you will get to grips with obfuscation and anti-disassembly, anti-debugging, as well as anti-virtual machine techniques. This book will help you deal with modern cross-platform malware. Throughout the course of this book, you will explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection. Finally, this book will help you strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms. By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents.What you will learnExplore widely used assembly languages to strengthen your reverse-engineering skillsMaster different executable file formats, programming languages, and relevant APIs used by attackersPerform static and dynamic analysis for multiple platforms and file typesGet to grips with handling sophisticated malware casesUnderstand real advanced attacks, covering all stages from infiltration to hacking the systemLearn to bypass anti-reverse engineering techniquesWho this book is forIf you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Prior programming experience and a fair understanding of malware attacks and investigation is expected.Table of ContentsA Crash Course in CISC & RISC Assembly and Basics of Computer ProgrammingBasic Static and Dynamic Analysis for x86/x64Unpacking, Decryption and DeobfuscationInspecting Process Injection & API HookingBypassing Anti-Reverse Engineering TechniquesUnderstanding Kernel-Mode & RootkitsHandling Exploits & ShellcodeReversing Bytecode Languages: DotNet, Java and MoreScripts & Macros: Reversing, Deobfuscation and DebuggingDissecting Linux and IoT MalwareIntro to MacOS and iOS ThreatsAnalyzing Android Malware Samples
✦ Table of Contents
Section 1. Fundamental theory. A crash course in CISC/RISC and programming basics --
Section 2. Diving deep into Windows malware. Basic static and dynamic analysis for x86/x64 --
Unpacking, decryption, and deobfuscation --
Inspecting process injection and API hooking --
Bypassing anti-reverse engineering techniques --
Understanding Kernel-mode rootkits --
Section 3. Examining cross-platform malware. Handling exploits and shellcode --
Reversing bytecode languages : .NET, Java, and more --
Scripts and macros : reversing, deobfuscation, and debugging --
Section 4. Looking into IoT and other platforms. Dissecting Linux and IoT malware --
Introduction to macOs and iOS threats --
Analyzing Android malware samples.
📜 SIMILAR VOLUMES
<DIV><p>Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.</p><p>For those who want to stay ahead of the latest malware, <i>Practical Malware Analysis
Practical Malware Analysis – книга для тех, кто хочет быть на шаг впереди последних вредоносных программ. Она дает практический анализ вредоносных программ и научит вас средствам и методам, используемым профессиональными аналитиками. С помощью этой книги, в качестве руководства, вы сможете безопасно
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, <i>Practical Malware Analysis</i> will t