71. Windows Malware Analysis Essentials

    Author: Myanmar Ebook Store Genre: »
    Rating

    Chapter 1: Down the Rabbit Hole
    Number systems
    Signed numbers and complements
    Boolean logic and bit masks
    Breathing in the ephemeral realm
    Sharpening the scalpel
    Performing binary reconnaissance
    Exploring the universe of binaries on PE Explorer
    Getting to know IDA Pro
    Entropy
    Summary

    Chapter 2: Dancing with the Dead
    Motivation
    Registers
    The initiation ritual
    Preparing the alter
    Code constructs in x86 disassembly
    Summary

    Chapter 3: Performing a Séance Session
    Fortifying your debrief
    Debriefing – seeing the forest for the trees
    Preparing for D-Day – lab setup
    Whippin' out your arsenal
    Summoning the demon!
    Post infection
    Exorcism and the aftermath – debrief finale!
    Summary

    Chapter 4: Traversing Across Parallel Dimensions
    Compression sacks and straps
    Alice in kernel land – kernel debugging with IDA Pro,
    Virtual KD, and VMware
    Summary

    Chapter 5: Good versus Evil – Ogre Wars
    Wiretapping Linux for network traffic analysis
    Encoding/decoding – XOR Deobfuscation
    Malicious Web Script Analysis
    Byte code decompilers
    Document analysis
    Redline – malware memory forensics
    Malware intelligence
    Summary

    Index

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll