Michael Sikorski is a malware analyst, researcher, and security consultant at Mandiant. His previous employers include the National Security Agency and MIT Lincoln Laboratory. Mike frequently teaches malware analysis to a variety of audiences including the FBI and Black Hat.
Andrew Honig is an Information Assurance Expert for the Department of Defense. He teaches courses on software analysis, reverse engineering, and Windows system programming. Andy is publicly credited with several zero-day exploits in VMware's virtualization products.
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to: * Set up a safe virtual environment to analyze malware * Quickly extract network signatures and host-based indicators * Use key analysis tools like IDA Pro, OllyDbg, and WinDbg * Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques * Use your newfound knowledge of Windows internals for malware analysis * Develop a methodology for unpacking malware and get practical experience with five of the most popular packers * Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back. Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
發表於2024-11-26
Practical Malware Analysis 2024 pdf epub mobi 電子書 下載
第15章習題 Lab15.3中通過SEH來執行惡意代碼,其還原存在一個問題 mov eax,large fs:0 // 獲取Esp mov eax,[eax] // 獲取ExceptionList mov eax,[eax] // 獲取Next mov large fs:0 eax; // 還原fs:0 如下代碼,其不僅將惡意代碼從鏈錶中摘除,也會摘除正常的第一個_EXCEPTION_R...
評分 評分隨便在哪傢網上書城進行搜索可以知道,在計算機安全類,特彆是惡意代碼分析領域的書籍可謂是鳳毛麟角。如果哪位讀者對於惡意代碼分析有濃厚的興趣,要麼是去一些大型的安全類論壇看他人的分析報告,要麼是在眾多的安全類書籍中,東找一點西湊一點地進行學習。這也就說明瞭市麵...
評分隨便在哪傢網上書城進行搜索可以知道,在計算機安全類,特彆是惡意代碼分析領域的書籍可謂是鳳毛麟角。如果哪位讀者對於惡意代碼分析有濃厚的興趣,要麼是去一些大型的安全類論壇看他人的分析報告,要麼是在眾多的安全類書籍中,東找一點西湊一點地進行學習。這也就說明瞭市麵...
評分圖書標籤: 計算機安全 安全 逆嚮 計算機 病毒 windows內核的 malware 信息安全
瞭解病毒分析的一本好書
評分幫助入門吧
評分幫助入門吧
評分瞭解病毒分析的一本好書
評分瞭解病毒分析的一本好書
Practical Malware Analysis 2024 pdf epub mobi 電子書 下載