Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Book Excerpt: Practical Malware Analysis – The Hands-on Guide to Dissecting Malicious Software
Managerially-focused professionals will find anything past the first few chapters very tough sledding. This is also not a book you casually read on a rainy Sunday afternoon; working through at least some of the labs that follow each chapter is required to garner the maximum benefit from the book. The authors organize their presentation into three parts dealing with analysis basic analysis, advanced static analysis and advanced dynamic analysis , a fourth part dealing with malware functionality what malware actually has to do in order to carry out its mission , a particularly fascinating fifth part that covers how malware authors harden their creations to resist detection and analysis, and a final part that deals with those interesting topics such as shellcode analysis and bit malware that don't really fit in the earlier sections.
The presentation is focused on practical application rather than theory, and it is peppered with timely warnings regarding paralysis-of-analysis and knowing when to say your analysis is sufficiently complete. Though all the chapters have their virtues, chapter 14, "Malware-Focused Network Signatures", is of particular note for its application of the results of malware analysis to detecting the malware or artifacts of its operation in network traffic using Snort.
- A Straightforward Guide to Family Law: A Concise Introduction to All Aspects of Family Law;
- Mastering Regular Expressions.
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software | AV-Comparatives.
A wide variety of tools are introduced some Open Source, some free and some commercial and their use illustrated and practiced in the labs. Appendix B provides a consolidated list and the reader will want to spend the hour or so downloading them before adventuring much past the second chapter.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)
The book goes on to examine how to overcome the evasive techniquesstealth, code obfuscation, anti-debugging, encryption, packing, and othersthat malware authors employ to thwart analysis attempts. Key chapters include a lab at the end, which reviews important concepts from the discussion in the context of real-world malware examples.
Drawn from the authors' extensive field experience combating malware, these labs make Practical Malware Analysisthe perfect teaching tool for beginners and seasoned veterans alike. Additional Product Features Dewey Edition. Show More Show Less.
Add to Cart. Any Condition Any Condition.
See all 5. People who bought this also bought.
Nonfiction Books. He teaches courses on software analysis, reverse engineering, and Windows system programming. Andy is publicly credited with several zero-day exploits in VMware's virtualization products.
Buy at Local Store. Enter your zip code below to purchase from an indie close to you.