Learning Malware Analysis : Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware.

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis an...

Full description

Saved in:
Bibliographic Details
Main Author: K. A, Monnappa
Format: eBook
Language:English
Published: Birmingham : Packt Publishing Ltd, 2018.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000Mi 4500
001 on1044947541
003 OCoLC
005 20241006213017.0
006 m o d
007 cr |n|---|||||
008 180714s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d MERUC  |d CHVBK  |d OCLCO  |d OCLCQ  |d LVT  |d OCLCF  |d C6I  |d OCLCQ  |d UX1  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB 
019 |a 1044836206  |a 1045489067  |a 1046107040  |a 1046648040  |a 1049604434  |a 1175632795 
020 |a 9781788397520 
020 |a 1788397525 
020 |z 1788392507 
020 |z 9781788392501 
020 |a 1788392507 
020 |a 9781788392501 
024 3 |a 9781788392501 
035 |a (OCoLC)1044947541  |z (OCoLC)1044836206  |z (OCoLC)1045489067  |z (OCoLC)1046107040  |z (OCoLC)1046648040  |z (OCoLC)1049604434  |z (OCoLC)1175632795 
037 |a B08104  |b 01201872 
050 4 |a QA76.76.C68  |b .M666 2018 
049 |a HCDD 
100 1 |a K. A, Monnappa. 
245 1 0 |a Learning Malware Analysis :  |b Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware. 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2018. 
300 |a 1 online resource (500 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Malware Analysis; 1. What Is Malware?; 2. What Is Malware Analysis?; 3. Why Malware Analysis?; 4. Types Of Malware Analysis; 5. Setting Up The Lab Environment; 5.1 Lab Requirements; 5.2 Overview Of Lab Architecture; 5.3 Setting Up And Configuring Linux VM; 5.4 Setting Up And Configuring Windows VM; 6. Malware Sources; Summary; Chapter 2: Static Analysis; 1. Determining the File Type; 1.1 Identifying File Type Using Manual Method. 
505 8 |a 1.2 Identifying File Type Using Tools1.3 Determining File Type Using Python; 2. Fingerprinting the Malware; 2.1 Generating Cryptographic Hash Using Tools; 2.2 Determining Cryptographic Hash in Python; 3. Multiple Anti-Virus Scanning; 3.1 Scanning the Suspect Binary with VirusTotal; 3.2 Querying Hash Values Using VirusTotal Public API; 4. Extracting Strings; 4.1 String Extraction Using Tools; 4.2 Decoding Obfuscated Strings Using FLOSS; 5. Determining File Obfuscation; 5.1 Packers and Cryptors; 5.2 Detecting File Obfuscation Using Exeinfo PE; 6. Inspecting PE Header Information. 
505 8 |a 6.1 Inspecting File Dependencies and Imports6.2 Inspecting Exports; 6.3 Examining PE Section Table And Sections; 6.4 Examining the Compilation Timestamp; 6.5 Examining PE Resources; 7. Comparing And Classifying The Malware; 7.1 Classifying Malware Using Fuzzy Hashing; 7.2 Classifying Malware Using Import Hash; 7.3 Classifying Malware Using Section Hash; 7.4 Classifying Malware Using YARA; 7.4.1 Installing YARA; 7.4.2 YARA Rule Basics; 7.4.3 Running YARA; 7.4.4 Applications of YARA; Summary; Chapter 3: Dynamic Analysis; 1. Lab Environment Overview; 2. System And Network Monitoring. 
505 8 |a 3. Dynamic Analysis (Monitoring) Tools3.1 Process Inspection with Process Hacker; 3.2 Determining System Interaction with Process Monitor; 3.3 Logging System Activities Using Noriben; 3.4 Capturing Network Traffic With Wireshark; 3.5 Simulating Services with INetSim; 4. Dynamic Analysis Steps; 5. Putting it All Together: Analyzing a Malware Executable; 5.1 Static Analysis of the Sample; 5.2 Dynamic Analysis of the Sample; 6. Dynamic-Link Library (DLL) Analysis; 6.1 Why Attackers Use DLLs; 6.2 Analyzing the DLL Using rundll32.exe; 6.2.1 Working of rundll32.exe. 
505 8 |a 6.2.2 Launching the DLL Using rundll32.exeExample 1 -- Analyzing a DLL With No Exports; Example 2 -- Analyzing a DLL Containing Exports; Example 3 -- Analyzing a DLL Accepting Export Arguments; 6.3 Analyzing a DLL with Process Checks; Summary; Chapter 4: Assembly Language and Disassembly Primer; 1. Computer Basics; 1.1 Memory; 1.1.1 How Data Resides In Memory; 1.2 CPU; 1.2.1 Machine Language; 1.3 Program Basics; 1.3.1 Program Compilation; 1.3.2 Program On Disk; 1.3.3 Program In Memory; 1.3.4 Program Disassembly (From Machine code To Assembly code); 2. CPU Registers; 2.1 General-Purpose Registers. 
500 |a 2.2 Instruction Pointer (EIP). 
520 |a Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics. 
630 0 0 |a Microsoft Windows (Computer file) 
630 0 7 |a Microsoft Windows (Computer file)  |2 fast 
650 0 |a Malware. 
650 0 |a Computer security. 
650 0 |a Computer software  |x Evaluation. 
650 7 |a Computer security  |2 fast 
650 7 |a Computer software  |x Evaluation  |2 fast 
758 |i has work:  |a Learning malware analysis (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH6qGc8q3GH4VTcF8ymRPP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a K A, Monnappa.  |t Learning Malware Analysis : Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware.  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781788392501 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=5446050  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD