Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st edition by Michael Sikorski, Andrew Honig – Ebook PDF Instant Download/Delivery. 1593272901 978-1593272906
Full download Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st edition after payment

Product details:
ISBN 10: 1593272901
ISBN 13: 978-1593272906
Author: Michael Sikorski, Andrew Honig
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you’ll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
You’ll learn how to:
–Set up a safe virtual environment to analyze malware
–Quickly extract network signatures and host-based indicators
–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg
–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques
–Use your newfound knowledge of Windows internals for malware analysis
–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers
–Analyze special cases of malware with shellcode, C++, and 64-bit code
Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You’ll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.
Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you’re tasked with securing one network or a thousand networks, or you’re making a living as a malware analyst, you’ll find what you need to succeed in Practical Malware Analysis.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st Table of contents:
Chapter 1: Introduction to Malware Analysis
- 1.1: What is Malware?
- 1.2: Overview of Malware Analysis
- 1.3: Setting Up Your Malware Analysis Environment
- 1.4: Analysis Methodology
- 1.5: Understanding the Role of Antivirus Software
- Summary
- Exercises
Chapter 2: Dissecting a Simple Malware Sample
- 2.1: Introduction to Static Analysis
- 2.2: Basic Static Analysis Tools
- 2.3: Analyzing the File Header
- 2.4: Strings and Their Significance
- 2.5: Analyzing the Code with a Disassembler
- 2.6: Basic Dynamic Analysis
- Summary
- Exercises
Chapter 3: Analyzing Windows Executables
- 3.1: Overview of Windows Executable Files
- 3.2: File Formats and Structures (PE, EXE, DLL)
- 3.3: Identifying Malicious Behavior in Windows Executables
- 3.4: Using PEiD, OllyDbg, and IDA Pro
- Summary
- Exercises
Chapter 4: The Windows API and Malware Behavior
- 4.1: Introduction to Windows API
- 4.2: Commonly Used Windows API Functions by Malware
- 4.3: Hooking and Malware’s Use of API Calls
- 4.4: Tracking API Calls Using API Monitors
- Summary
- Exercises
Chapter 5: Analyzing Malware with Sandboxes
- 5.1: What is a Sandbox?
- 5.2: Setting Up a Malware Sandbox Environment
- 5.3: Automated Malware Analysis Tools
- 5.4: Behavioral Analysis in Sandboxes
- Summary
- Exercises
Chapter 6: Dynamic Analysis: Debugging and Tracing Malware
- 6.1: Introduction to Dynamic Analysis
- 6.2: Using OllyDbg and Immunity Debugger
- 6.3: Malware Code Injection and API Monitoring
- 6.4: Tracing Malware Execution Flow
- Summary
- Exercises
Chapter 7: Identifying Malware’s Network Activity
- 7.1: Malware’s Use of Networking
- 7.2: Understanding Network Traffic and Protocols
- 7.3: Tools for Capturing Network Traffic (Wireshark, Fiddler)
- 7.4: Analyzing Malicious Network Communications
- 7.5: Detecting Command and Control (C2) Servers
- Summary
- Exercises
Chapter 8: Malware Analysis for Rootkits and Anti-Analysis Techniques
- 8.1: Understanding Rootkits and Their Functionality
- 8.2: Detecting Kernel-Level Rootkits
- 8.3: Analyzing User-Mode Rootkits
- 8.4: Common Anti-Analysis Techniques in Malware
- 8.5: Countermeasures Against Anti-Analysis Techniques
- Summary
- Exercises
Chapter 9: Reverse Engineering Malicious Code
- 9.1: Disassembling Malware Code
- 9.2: Reversing Obfuscated Malware
- 9.3: Rebuilding Decompiled Code
- 9.4: Analyzing Malware Using IDA Pro
- Summary
- Exercises
Chapter 10: Malware Case Studies
- 10.1: Case Study 1: Virus Analysis
- 10.2: Case Study 2: Worm Analysis
- 10.3: Case Study 3: Trojan Analysis
- 10.4: Case Study 4: Rootkit Analysis
- 10.5: Case Study 5: Ransomware Analysis
- Summary
Chapter 11: Writing Effective Malware Analysis Reports
- 11.1: Why Malware Analysis Reports Are Important
- 11.2: Components of a Malware Analysis Report
- 11.3: Communicating with Stakeholders
- 11.4: Ethical Considerations in Malware Analysis
- Summary
Chapter 12: Advanced Malware Analysis Techniques
- 12.1: Behavior-Based Malware Detection
- 12.2: Static Analysis of Encrypted and Packed Malware
- 12.3: Analyzing Fileless Malware
- 12.4: Using Virtual Machines and Hypervisors for Analysis
- Summary
Appendices
- A: Malware Analysis Tools Overview
- B: Setting Up a Malware Analysis Lab
- C: Common File Formats and Structures in Malware
- D: Glossary of Terms
- E: Index
People also search for Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st:
practical malware analysis labs
practical malware analysis reddit
practical malware analysis lab 13-1
practical malware analysis lab 9-1
practical malware analysis lab 1-2