Autorzy | |
Wydawnictwo | Springer, Berlin |
Data wydania | |
Liczba stron | 914 |
Forma publikacji | książka w miękkiej oprawie |
Język | angielski |
ISBN | 9781484261927 |
Kategorie | Bezpieczeństwo komputerowe |
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you.
The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation.
The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment.Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
Part 1: Introduction
1. Introduction
2. Malware Analysis Lab Setup
Part 2: OS and System Fundamentals3. File & File Formats
4. Virtual Memory & Portable Executable(PE) File
5. Windows InternalsPart 3: Malware Components & Analysis
6. Malware Components & Distribution
7. Malware Packers8. Persistence Mechanisms
9. Network Communication
10. Code Injection, Process Hollowing & API Hooking11. Stealth and Rootkits
Part 3: Malware Analysis & Classification
12. Static Analysis13. Dynamic Analysis
14. Memory Forensics With Volatility
15. Malware Payload Dissection & ClassificationPart 4: Malware Reverse Engineering
16. Debuggers & Assembly Language
17. Debugging Tricks for Unpacking Malwares18. Debugging Code Injection
19. Armoring & Evasion - The Anti Techniques
20. File-less, Macros & Other Malware TrendsPart 5: Detection Engineering
21. Dev Analysis Lab Setup
22. Anti-Virus Engines23. IDS/IPS & Snort/Suricata Rule Writing
24. Malware Sandbox Internals
25. Binary Instrumentation for Reversing Automation