Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Buy

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • Develop innovative solutions to numerous malware incidents

Book Description

With the proliferation of technology and increase in prominent ransomware attacks, malware analysis has become a trending topic in recent years. With the help of this book, you'll be able to mitigate the risk of encountering malicious code and malware.

Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You'll learn how to examine malware code, determine the damage it can cause to your systems, and prevent it from propagating. This book even covers all aspects of malware analysis for the Windows platform in detail. As you advance, you'll get to grips with obfuscation as well as delve into anti-disassembly, anti-debugging, and anti-virtual machine techniques. Throughout the course of this book, you'll explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection, and learn to deal with modern cross-platform malware. Finally, you'll study how to strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms.

By the end of this book, you'll have learned to effectively analyze and investigate malware incidents and build innovative solutions to tackle them.

What you will learn

  • Explore widely used assembly languages to enhance your reverse-engineering skills
  • Master different executable file formats, programming languages, and relevant APIs used by attackers
  • Perform static and dynamic analysis for multiple platforms and file types
  • Get to grips with handling sophisticated malware cases
  • Understand all stages of real advanced attacks, from infiltration to hacking the system
  • Discover how you can bypass anti-reverse engineering techniques

Who this book is for

If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Some programming experience and a fair understanding of malware attacks and investigation is expected.

Table of Contents

  1. A Crash Course in CISC & RISC Assembly and Basics of Computer Programming
  2. Basic Static and Dynamic Analysis for x86/x64
  3. Unpacking, Decryption and Deobfuscation
  4. Inspecting Process Injection & API Hooking
  5. Bypassing Anti-Reverse Engineering Techniques
  6. Understanding Kernel-Mode & Rootkits
  7. Handling Exploits & Shellcode
  8. Reversing Bytecode Languages: DotNet, Java and More
  9. Scripts & Macros: Reversing, Deobfuscation and Debugging
  10. Dissecting Linux and IoT Malware
  11. Intro to MacOS and iOS Threats
  12. Analyzing Android Malware Samples
(HTML tags aren't allowed.)

Intermediate Robot Building
Intermediate Robot Building

Greetings robot builder!

Over the years, I’ve created many homemade robots (some of which, only the builder could love). However, with each successive robotic generation, I try to gradually expand my knowledge of electronics, mechanics, machining, software, and art by experimenting with new techniques, features, or parts...

Getting Started with Electronic Projects
Getting Started with Electronic Projects

Build thrilling and intricate electronic projects using LM555, ZigBee, and BeagleBone

About This Book

  • Get acquainted with fundamental concepts such as tools and circuits required for the projects
  • Develop stunning cost-effective projects and build your own range of designs including...
Infrared Spectroscopy of Triatomics for Space Observation (Infrared Spectroscope Set)
Infrared Spectroscopy of Triatomics for Space Observation (Infrared Spectroscope Set)

This book is dedicated to the application of the different theoretical models described in Volume 1 to identify the near-, mid- and far-infrared spectra of linear and nonlinear triatomic molecules in gaseous phase or subjected to environmental constraints, useful for the study of environmental sciences, planetology and...


Beginning HTML5 and CSS3: The Web Evolved
Beginning HTML5 and CSS3: The Web Evolved

Beginning HTML5 and CSS3 is your introduction to the new features and elements of HTML5—as a web developer you'll learn about all the leaner, cleaner, and more efficient code available now with HTML5, along with some new tools that will allow you to create more meaningful and richer content. For everyone involved in web...

Real World SharePoint 2010: Indispensable Experiences from 22 MVPs
Real World SharePoint 2010: Indispensable Experiences from 22 MVPs

Proven real-world best practices from leading Microsoft SharePoint MVPs

SharePoint enables Web sites to host shared workspaces and is a leading solution for Enterprise Content Management. The newest version boasts significant changes, impressive enhancements, and new features, requiring developers and administrators of all...

Coaching Handbook: An Action Kit for Trainers and Managers
Coaching Handbook: An Action Kit for Trainers and Managers

Coaching is proving itself to be the most popular and most effective technique in the field of learning and development. Managers are constantly being reminded that coaching is an important part of their role in getting the best from staff, while trainers are increasingly being called upon to coach individuals in a variety of aspects of both...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy