Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Buy

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • Develop innovative solutions to numerous malware incidents

Book Description

With the proliferation of technology and increase in prominent ransomware attacks, malware analysis has become a trending topic in recent years. With the help of this book, you'll be able to mitigate the risk of encountering malicious code and malware.

Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You'll learn how to examine malware code, determine the damage it can cause to your systems, and prevent it from propagating. This book even covers all aspects of malware analysis for the Windows platform in detail. As you advance, you'll get to grips with obfuscation as well as delve into anti-disassembly, anti-debugging, and anti-virtual machine techniques. Throughout the course of this book, you'll explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection, and learn to deal with modern cross-platform malware. Finally, you'll study how to strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms.

By the end of this book, you'll have learned to effectively analyze and investigate malware incidents and build innovative solutions to tackle them.

What you will learn

  • Explore widely used assembly languages to enhance your reverse-engineering skills
  • Master different executable file formats, programming languages, and relevant APIs used by attackers
  • Perform static and dynamic analysis for multiple platforms and file types
  • Get to grips with handling sophisticated malware cases
  • Understand all stages of real advanced attacks, from infiltration to hacking the system
  • Discover how you can bypass anti-reverse engineering techniques

Who this book is for

If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Some programming experience and a fair understanding of malware attacks and investigation is expected.

Table of Contents

  1. A Crash Course in CISC & RISC Assembly and Basics of Computer Programming
  2. Basic Static and Dynamic Analysis for x86/x64
  3. Unpacking, Decryption and Deobfuscation
  4. Inspecting Process Injection & API Hooking
  5. Bypassing Anti-Reverse Engineering Techniques
  6. Understanding Kernel-Mode & Rootkits
  7. Handling Exploits & Shellcode
  8. Reversing Bytecode Languages: DotNet, Java and More
  9. Scripts & Macros: Reversing, Deobfuscation and Debugging
  10. Dissecting Linux and IoT Malware
  11. Intro to MacOS and iOS Threats
  12. Analyzing Android Malware Samples
(HTML tags aren't allowed.)

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Foundations of Embedded Systems (Studies in Systems, Decision and Control (195))
Foundations of Embedded Systems (Studies in Systems, Decision and Control (195))
This book is devoted to embedded systems (ESs), which can now be found in practically all fields of human activity. Embedded systems are essentially a special class of computing systems designed for monitoring and controlling objects of the physical world.

The book begins by discussing the distinctive features of
...
PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting
PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting

This pocket reference has been updated with the new PHP 8 release. It is a condensed, code-rich scripting and syntax handbook for the PHP scripting language. You won’t find any technical jargon, bloated samples, drawn-out history lessons or witty stories in this book. What you will find is a web scripting language...


PostgreSQL Server Programming - Second Edition
PostgreSQL Server Programming - Second Edition

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

About This Book

  • Acquaint yourself with all the options to extend PostgreSQL using the programming language of your choice such as C++ and...
Computer Networking
Computer Networking
Welcome to the eighth edition of Computer Networking: A Top-Down Approach. Since the publication of the first edition 20 years ago, our book has been adopted for use at many hundreds of colleges and universities, translated into 14 languages, and used by many hundreds of thousands students and practitioners worldwide. We’ve...
PostgreSQL Developer s Guide
PostgreSQL Developer s Guide

Design, develop, and implement streamlined databases with PostgreSQL

About This Book

  • Design efficient, real-world database solutions and extend your knowledge of database concepts
  • Learn how to program using native PostgreSQL procedural languages to write custom functions
  • ...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy