Master malware analysis to protect your systems from getting infected
Key Features
-
Set up and model solutions, investigate malware, and prevent it from recurring
-
Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
-
Develop innovative solutions to numerous malware incidents
Book Description
With the proliferation of technology and increase in prominent ransomware attacks, malware analysis has become a trending topic in recent years. With the help of this book, you'll be able to mitigate the risk of encountering malicious code and malware.
Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You'll learn how to examine malware code, determine the damage it can cause to your systems, and prevent it from propagating. This book even covers all aspects of malware analysis for the Windows platform in detail. As you advance, you'll get to grips with obfuscation as well as delve into anti-disassembly, anti-debugging, and anti-virtual machine techniques. Throughout the course of this book, you'll explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection, and learn to deal with modern cross-platform malware. Finally, you'll study how to strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms.
By the end of this book, you'll have learned to effectively analyze and investigate malware incidents and build innovative solutions to tackle them.
What you will learn
-
Explore widely used assembly languages to enhance your reverse-engineering skills
-
Master different executable file formats, programming languages, and relevant APIs used by attackers
-
Perform static and dynamic analysis for multiple platforms and file types
-
Get to grips with handling sophisticated malware cases
-
Understand all stages of real advanced attacks, from infiltration to hacking the system
-
Discover how you can bypass anti-reverse engineering techniques
Who this book is for
If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Some programming experience and a fair understanding of malware attacks and investigation is expected.
Table of Contents
-
A Crash Course in CISC & RISC Assembly and Basics of Computer Programming
-
Basic Static and Dynamic Analysis for x86/x64
-
Unpacking, Decryption and Deobfuscation
-
Inspecting Process Injection & API Hooking
-
Bypassing Anti-Reverse Engineering Techniques
-
Understanding Kernel-Mode & Rootkits
-
Handling Exploits & Shellcode
-
Reversing Bytecode Languages: DotNet, Java and More
-
Scripts & Macros: Reversing, Deobfuscation and Debugging
-
Dissecting Linux and IoT Malware
-
Intro to MacOS and iOS Threats
-
Analyzing Android Malware Samples