نام کتاب
Learning Malware Analysis

Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Monnappa K A

Paperback500 Pages
PublisherPackt
Edition1
LanguageEnglish
Year2018
ISBN9781788392501
1K
A1563
انتخاب نوع چاپ:
جلد سخت
870,000ت
0
جلد نرم
810,000ت
0
طلق پاپکو و فنر
820,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:رنگی با کادر / تصویر
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Malware

#Malware_Analysis

#Windows_malware

#IDA

#x64dbg

#Hooking

توضیحات

Understand malware analysis and its practical implementation


Key Features

•  Explore the key concepts of malware analysis and memory forensics using real-world examples

•  Learn the art of detecting, analyzing, and investigating malware threats

•  Understand adversary tactics and techniques


Book Description

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. 

This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics.

 

This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.


What you will learn

•  Create a safe and isolated lab environment for malware analysis

•  Extract the metadata associated with malware

•  Determine malware's interaction with the system

•  Perform code analysis using IDA Pro and x64dbg

•  Reverse-engineer various malware functionalities

•  Reverse engineer and decode common encoding/encryption algorithms

•  Reverse-engineer malware code injection and hooking techniques

•  Investigate and hunt malware using memory forensics


Who this book is for

This book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book.


Table of Contents

1. Introduction to Malware Analysis

2. Static Analysis3. Dynamic Analysis

4. Assembly Language and Disassembly Primers

5. Disassembly Using IDA

6. Debugging Malicious Binaries

7. Malware Functionalities and Persistence

8. Code Injection and Hooking

9. Malware Obfuscation Techniques

10. Hunting Malware Using Memory Forensics

11. Detecting Advanced Malware Using Memory Forensics


About the Author

Monnappa K A works for Cisco Systems as an information security investigator focusing on threat intelligence and the investigation of advanced cyber attacks. He is a member of the Black Hat review board, the creator of Limon Linux sandbox, the winner of the Volatility plugin contest 2016, and the co-founder of the Cysinfo cybersecurity research community. He has presented and conducted training sessions at various security conferences including Black Hat, FIRST, OPCDE, and DSCI. He regularly conducts training at the Black Hat Security Conference in USA, Asia, and Europe.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
781
The Vulnerability Researcher's Handbook
498,000 تومان
هک و امنیت
917
Cyber Threat Intelligence
405,000 تومان
هک و امنیت
928
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
621,000 تومان
هک و امنیت
1,065
Security as Code
294,000 تومان
هک و امنیت
3,634
Real-World Bug Hunting
453,000 تومان
هک و امنیت
710
Hands-On Security in DevOps
536,000 تومان
Network
1,196
Python for Security and Networking
966,000 تومان
هک و امنیت
817
Fighting Phishing
655,000 تومان
هک و امنیت
795
CEHv9 Certified Ethical Hacker Version 9 - Study Guide - Exam 312-50
1,037,000 تومان
هک و امنیت
249
Cyber-Physical Systems Security
507,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©