Mastering Malware Analysis: The complete malware analyst’s guide to combating malicious software, APT, cybercrime, and IoT attacks


Price: points - Details)



points , , points -

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • Develop innovative solutions to numerous malware incidents

Book Description

With the proliferation of technology and increase in prominent ransomware attacks, malware analysis has become a trending topic in recent years. With the help of this book, you’ll be able to mitigate the risk of encountering malicious code and malware.

Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You’ll learn how to examine malware code, determine the damage it can cause to your systems, and prevent it from propagating. This book even covers all aspects of malware analysis for the Windows platform in detail. As you advance, you’ll get to grips with obfuscation as well as delve into anti-disassembly, anti-debugging, and anti-virtual machine techniques. Throughout the course of this book, you’ll explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection, and learn to deal with modern cross-platform malware. Finally, you’ll study how to strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms.

By the end of this book, you’ll have learned to effectively analyze and investigate malware incidents and build innovative solutions to tackle them.

What you will learn

  • Explore widely used assembly languages to enhance your reverse-engineering skills
  • Master different executable file formats, programming languages, and relevant APIs used by attackers
  • Perform static and dynamic analysis for multiple platforms and file types
  • Get to grips with handling sophisticated malware cases
  • Understand all stages of real advanced attacks, from infiltration to hacking the system
  • Discover how you can bypass anti-reverse engineering techniques

Who this book is for

If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Some programming experience and a fair understanding of malware attacks and investigation is expected.

Table of Contents

  1. A Crash Course in CISC & RISC Assembly and Basics of Computer Programming
  2. Basic Static and Dynamic Analysis for x86/x64
  3. Unpacking, Decryption and Deobfuscation
  4. Inspecting Process Injection & API Hooking
  5. Bypassing Anti-Reverse Engineering Techniques
  6. Understanding Kernel-Mode & Rootkits
  7. Handling Exploits & Shellcode
  8. Reversing Bytecode Languages: DotNet, Java and More
  9. Scripts & Macros: Reversing, Deobfuscation and Debugging
  10. Dissecting Linux and IoT Malware
  11. Intro to MacOS and iOS Threats
  12. Analyzing Android Malware Samples

Leave a Comment