Chapter 1: Down the Rabbit Hole
Number systems
Signed numbers and complements
Boolean logic and bit masks
Breathing in the ephemeral realm
Sharpening the scalpel
Performing binary reconnaissance
Exploring the universe of binaries on PE Explorer
Getting to know IDA Pro
Entropy
Summary
Chapter 2: Dancing with the Dead
Motivation
Registers
The initiation ritual
Preparing the alter
Code constructs in x86 disassembly
Summary
Chapter 3: Performing a Séance Session
Fortifying your debrief
Debriefing – seeing the forest for the trees
Preparing for D-Day – lab setup
Whippin' out your arsenal
Summoning the demon!
Post infection
Exorcism and the aftermath – debrief finale!
Summary
Chapter 4: Traversing Across Parallel Dimensions
Compression sacks and straps
Alice in kernel land – kernel debugging with IDA Pro,
Virtual KD, and VMware
Summary
Chapter 5: Good versus Evil – Ogre Wars
Wiretapping Linux for network traffic analysis
Encoding/decoding – XOR Deobfuscation
Malicious Web Script Analysis
Byte code decompilers
Document analysis
Redline – malware memory forensics
Malware intelligence
Summary
Index
71. Windows Malware Analysis Essentials
Author:
Myanmar Ebook Store
Genre:
»
Hacking
Rating
Posted by Myanmar Ebook Store
Posted on
