Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks


Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • Develop innovative solutions to numerous malware incidents

Book Description

With the proliferation of technology and increase in prominent ransomware attacks, malware analysis has become a trending topic in recent years. With the help of this book, you'll be able to mitigate the risk of encountering malicious code and malware.

Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You'll learn how to examine malware code, determine the damage it can cause to your systems, and prevent it from propagating. This book even covers all aspects of malware analysis for the Windows platform in detail. As you advance, you'll get to grips with obfuscation as well as delve into anti-disassembly, anti-debugging, and anti-virtual machine techniques. Throughout the course of this book, you'll explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection, and learn to deal with modern cross-platform malware. Finally, you'll study how to strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms.

By the end of this book, you'll have learned to effectively analyze and investigate malware incidents and build innovative solutions to tackle them.

What you will learn

  • Explore widely used assembly languages to enhance your reverse-engineering skills
  • Master different executable file formats, programming languages, and relevant APIs used by attackers
  • Perform static and dynamic analysis for multiple platforms and file types
  • Get to grips with handling sophisticated malware cases
  • Understand all stages of real advanced attacks, from infiltration to hacking the system
  • Discover how you can bypass anti-reverse engineering techniques

Who this book is for

If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Some programming experience and a fair understanding of malware attacks and investigation is expected.

Table of Contents

  1. A Crash Course in CISC & RISC Assembly and Basics of Computer Programming
  2. Basic Static and Dynamic Analysis for x86/x64
  3. Unpacking, Decryption and Deobfuscation
  4. Inspecting Process Injection & API Hooking
  5. Bypassing Anti-Reverse Engineering Techniques
  6. Understanding Kernel-Mode & Rootkits
  7. Handling Exploits & Shellcode
  8. Reversing Bytecode Languages: DotNet, Java and More
  9. Scripts & Macros: Reversing, Deobfuscation and Debugging
  10. Dissecting Linux and IoT Malware
  11. Intro to MacOS and iOS Threats
  12. Analyzing Android Malware Samples
(HTML tags aren't allowed.)

Crystal Clear : A Human-Powered Methodology for Small Teams (Agile Software Development Series)
Crystal Clear : A Human-Powered Methodology for Small Teams (Agile Software Development Series)

Carefully researched over ten years and eagerly anticipated by the agile community, Crystal Clear: A Human-Powered Methodology for Small Teams is a lucid and practical introduction to running a successful agile project in your organization. Each chapter illuminates a different important aspect of...

Retro Gaming Hacks
Retro Gaming Hacks

Maybe it was the recent Atari 2600 milestone anniversary that fueled nostalgia for the golden days of computer and console gaming. Every Game Boy must ponder his roots from time to time. But whatever is driving the current retro gaming craze, one thing is certain: classic games are back for a big second act, and they're being...

Understanding the Network: A Practical Guide to Internetworking
Understanding the Network: A Practical Guide to Internetworking
The growing dependence of enterprise networks on Internet connectivity is forcing professional system and network administrators to turn to technologies that they may not fully understand for solutions. This book will provide those connectivity solutions, delivering both an understanding of technology fundamentals and their practical applications....

Information Processing with Evolutionary Algorithms: From Industrial Applications to Academic Speculations
Information Processing with Evolutionary Algorithms: From Industrial Applications to Academic Speculations
The last decade of the twentieth century has witnessed a surge of interest in numerical, computational intensive approaches to information processing. The lines that draw the boundaries between statistics, optimization, artificial intelligence and information processing are disappearing and it is not uncommon to find well founded and sophisticated...
LPIC Prep Kit 101 General Linux I (Exam Guide)
LPIC Prep Kit 101 General Linux I (Exam Guide)
The Linux Level I Exam Guide prepares you to pass the Linux Level I exam. The tutorial text is strictly exam-related and flows with minimal interruption, covering all necessary objectives for the exam. Study aids begin with the Chapter Opener to ready you for learning. To help you fully understand the topic, visual cues are used liberally...

This is a book about connecting to the Internet as reliably as possible. This means eliminating all single points of failure,including having just one Internet service provider (ISP). By multihoming to two or more ISPs,you can remain connected when either ISP (or your connection to them) experiences problems. However,there...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy