Windows Malware Analysis Essentials

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Windows Malware Analysis Essentials by Victor Marak, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Victor Marak ISBN: 9781785287633
Publisher: Packt Publishing Publication: September 1, 2015
Imprint: Packt Publishing Language: English
Author: Victor Marak
ISBN: 9781785287633
Publisher: Packt Publishing
Publication: September 1, 2015
Imprint: Packt Publishing
Language: English

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

About This Book

  • Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware
  • Understand how to decipher x86 assembly code from source code inside your favourite development environment
  • A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process

Who This Book Is For

This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around.

What You Will Learn

  • Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes
  • Get introduced to static and dynamic analysis methodologies and build your own malware lab
  • Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief
  • Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program
  • Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario
  • Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode

In Detail

Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation.

We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals.

By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process.

Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware.

Style and approach

An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

About This Book

Who This Book Is For

This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around.

What You Will Learn

In Detail

Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation.

We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals.

By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process.

Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware.

Style and approach

An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

More books from Packt Publishing

Cover of the book Amazon Web Services: Migrating your .NET Enterprise Application by Victor Marak
Cover of the book Mastering CoreOS by Victor Marak
Cover of the book Final Cut Pro X Cookbook by Victor Marak
Cover of the book Getting Started with Grunt: The JavaScript Task Runner by Victor Marak
Cover of the book Microsoft Data Protection Manager 2010 by Victor Marak
Cover of the book Android Development Tools for Eclipse by Victor Marak
Cover of the book Ceph: Designing and Implementing Scalable Storage Systems by Victor Marak
Cover of the book Oracle Fusion Applications Administration Essentials by Victor Marak
Cover of the book Learn Web Development with Python by Victor Marak
Cover of the book Learning Ext JS 4 by Victor Marak
Cover of the book ASP.NET Core and Angular 2 by Victor Marak
Cover of the book Mastering UDK Game Development by Victor Marak
Cover of the book Embedded Systems Architecture by Victor Marak
Cover of the book Application Development in iOS 7 by Victor Marak
Cover of the book Learning SAP BusinessObjects Dashboards by Victor Marak
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy