
Instant online reading.
Don't wait for delivery!
Go digital and save!
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
By:Â Michael Sikorski, Andrew Honig
Paperback | 28 February 2012
At a Glance
800 Pages
23.3 x 17.8 x 4.1
Paperback
RRP $120.00
$95.75
20%OFF
or 4 interest-free payments of $23.94 with
 orÂShips in 5 to 10 business days
Malware analysis is big business. Not only is it a lucrative, rapidly-growing field, but attacks can cost a company dearly. As a security professional, you have to prepare for the worst. When malware breaches your defenses or a client drops a freshly minted piece of malware into your Inbox, you need to be able to understand that malware infiltrator as completely as possible and to act quickly and competently to cure any infections.
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you how to use the tools and techniques that professional malware analysts use to dissect malicious software. With this book as your guide, you'll learn how to safely analyze, debug, and disassemble malware to put yourself in the driver's seat; not the malware author.
You'll learn how to:
- Set up a safe malware laboratory
- Develop network signatures and host-based indicators
- Use key analysis tools like IDA Pro, OllyDbg, WinDbg, and Procmon
- Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques
- Use your new-found knowledge of Windows internals for malware analysis
- Unpack malware and use five of the most popular packers
- Analyze special cases of malware with shellcode, C++, and 64-bit code
Hands-on labs at the end of each chapter challenge you to practice and synthesize your skills as you dissect real malware samples. And pages of detailed analysis of the dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, how it's trying to outsmart you, and how to gauge its dangers.
Malware analysis is a cat and mouse game with rules that are constantly changing. Whether you're tasked with fighting malware on one or a thousand networks or you're making a business of malware analysis, you'll find what you need to succeed in Practical Malware Analysis.
Industry Reviews
--ZDNet
| Praise for Practical Malware Analysis | |
| Warning | |
| About The Authors | |
| About the Technical Reviewer | |
| About the Contributing Authors; Foreword | |
| Acknowledgments | |
| Individual Thanks | |
| Introduction | |
| What Is Malware Analysis? | |
| Prerequisites | |
| Practical, Hands-On Learning | |
| What's in the Book? | |
| Malware Analysis Primer | |
| The Goals of Malware Analysis | |
| Malware Analysis Techniques | |
| Types of Malware | |
| General Rules for Malware Analysis; Basic Analysis | |
| Basic Static Techniques | |
| Antivirus Scanning: A Useful First Step | |
| Hashing: A Fingerprint for Malware | |
| Finding Strings | |
| Packed and Obfuscated Malware | |
| Portable Executable File Format | |
| Linked Libraries and Functions | |
| Static Analysis in Practice | |
| The PE File Headers and Sections | |
| Conclusion | |
| Labs | |
| Malware Analysis in Virtual Machines | |
| The Structure of a Virtual Machine | |
| Creating Your Malware Analysis Machine | |
| Using Your Malware Analysis Machine | |
| The Risks of Using VMware for Malware Analysis | |
| Record/Replay: Running Your Computer in Reverse | |
| Conclusion | |
| Basic Dynamic Analysis | |
| Sandboxes: The Quick-and-Dirty Approach | |
| Running Malware | |
| Monitoring with Process Monitor | |
| Viewing Processes with Process Explorer | |
| Comparing Registry Snapshots with Regshot | |
| Faking a Network | |
| Packet Sniffing with Wireshark | |
| Using INetSim | |
| Basic Dynamic Tools in Practice | |
| Conclusion | |
| Labs; Advanced Static Analysis | |
| A Crash Course in x86 Disassembly | |
| Levels of Abstraction | |
| Reverse-Engineering | |
| The x86 Architecture | |
| Conclusion | |
| IDA Pro | |
| Loading an Executable | |
| The IDA Pro Interface | |
| Using Cross-References | |
| Analyzing Functions | |
| Using Graphing Options | |
| Enhancing Disassembly | |
| Extending IDA with Plug-ins | |
| Conclusion | |
| Labs | |
| Recognizing C Code Constructs in Assembly | |
| Global vs. Local Variables | |
| Disassembling Arithmetic Operations | |
| Recognizing if Statements | |
| Recognizing Loops | |
| Understanding Function Call Conventions | |
| Analyzing switch Statements | |
| Disassembling Arrays | |
| Identifying Structs | |
| Analyzing Linked List Traversal | |
| Conclusion | |
| Labs | |
| Analyzing Malicious Windows Programs | |
| The Windows API | |
| The Windows Registry | |
| Networking APIs | |
| Following Running Malware | |
| Kernel vs. User Mode | |
| The Native API | |
| Conclusion | |
| Labs; Advanced Dynamic Analysis | |
| Debugging | |
| Source-Level vs. Assembly-Level Debuggers | |
| Kernel vs. User-Mode Debugging | |
| Using a Debugger | |
| Exceptions | |
| Modifying Execution with a Debugger | |
| Modifying Program Execution in Practice | |
| Conclusion | |
| OllyDbg | |
| Loading Malware | |
| The OllyDbg Interface | |
| Memory Map | |
| Viewing Threads and Stacks | |
| Executing Code | |
| Breakpoints | |
| Loading DLLs | |
| Tracing | |
| Exception Handling | |
| Patching | |
| Analyzing Shellcode | |
| Assistance Features | |
| Plug-ins | |
| Scriptable Debugging | |
| Conclusion | |
| Labs | |
| Kernel Debugging with WinDbg | |
| Drivers and Kernel Code | |
| Setting Up Kernel Debugging | |
| Using WinDbg | |
| Microsoft Symbols | |
| Kernel Debugging in Practice | |
| Rootkits | |
| Loading Drivers | |
| Kernel Issues for Windows Vista, Windows 7, and x64 Versions | |
| Conclusion | |
| Labs; Malware Functionality | |
| Malware Behavior | |
| Downloaders and Launchers | |
| Backdoors | |
| Credential Stealers | |
| Persistence Mechanisms | |
| Privilege Escalation | |
| Covering Its Tracks—User-Mode Rootkits | |
| Conclusion | |
| Labs | |
| Covert Malware Launching | |
| Launchers | |
| Process Injection | |
| Process Replacement | |
| Hook Injection | |
| Detours | |
| APC Injection | |
| Conclusion | |
| Labs | |
| Data Encoding | |
| The Goal of Analyzing Encoding Algorithms | |
| Simple Ciphers | |
| Common Cryptographic Algorithms | |
| Custom Encoding | |
| Decoding | |
| Conclusion | |
| Labs | |
| Malware-Focused Network Signatures | |
| Network Countermeasures | |
| Safely Investigate an Attacker Online | |
| Content-Based Network Countermeasures | |
| Combining Dynamic and Static Analysis Techniques | |
| Understanding the Attacker's Perspective | |
| Conclusion | |
| Labs; Anti-Reverse-Engineering | |
| Anti-Disassembly | |
| Understanding Anti-Disasseeeeeembly | |
| Defeating Disassembly Algorithms | |
| Anti-Disassembly Techniques | |
| Obscuring Flow Control | |
| Thwarting Stack-Frame Analysis | |
| Conclusion | |
| Labs | |
| Anti-Debugging | |
| Windows Debugger Detection | |
| Identifying Debugger Behavior | |
| Interfering with Debugger Functionality | |
| Debugger Vulnerabilities | |
| Conclusion | |
| Labs | |
| Anti-Virtual Machine Techniques | |
| VMware Artifacts | |
| Vulnerable Instructions | |
| Tweaking Settings | |
| Escaping the Virtual Machine | |
| Conclusion | |
| Labs | |
| Packers and Unpacking | |
| Packer Anatomy | |
| Identifying Packed Programs | |
| Unpacking Options | |
| Automated Unpacking | |
| Manual Unpacking | |
| Tips and Tricks for Common Packers | |
| Analyzing Without Fully Unpacking | |
| Packed DLLs | |
| Conclusion | |
| Labs; Special Topics | |
| Shellcode Analysis | |
| Loading Shellcode for Analysis | |
| Position-Independent Code | |
| Identifying Execution Location | |
| Manual Symbol Resolution | |
| A Full Hello World Example | |
| Shellcode Encodings | |
| NOP Sleds | |
| Finding Shellcode | |
| Conclusion | |
| Labs | |
| C++ Analysis | |
| Object-Oriented Programming | |
| Virtual vs. Nonvirtual Functions | |
| Creating and Destroying Objects | |
| Conclusion | |
| Labs | |
| 64-Bit Malware | |
| Why 64-Bit Malware? | |
| Differences in x64 Architecture | |
| Windows 32-Bit on Windows 64-Bit | |
| 64-Bit Hints at Malware Functionality | |
| Conclusion | |
| Labs | |
| Important Windows Functions | |
| Tools for Malware Analysis | |
| Solutions to Labs | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Solutions | |
| Table of Contents provided by Publisher. All Rights Reserved. |
ISBN: 9781593272906
ISBN-10: 1593272901
Series: NO STARCH PRESS
Published: 28th February 2012
Format: Paperback
Language: English
Number of Pages: 800
Audience: General Adult
Publisher: RANDOM HOUSE US
Country of Publication: GB
Dimensions (cm): 23.3 x 17.8 x 4.1
Weight (kg): 1.27
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Red Team Evaluation Framework
Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team
Paperback
RRP $105.00
$65.75
OFF

Red Team Evaluation Framework
Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team
Hardcover
RRP $252.00
$219.75
OFF






















