|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
on1044947541 |
003 |
OCoLC |
005 |
20241006213017.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180714s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d MERUC
|d CHVBK
|d OCLCO
|d OCLCQ
|d LVT
|d OCLCF
|d C6I
|d OCLCQ
|d UX1
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|d SXB
|
019 |
|
|
|a 1044836206
|a 1045489067
|a 1046107040
|a 1046648040
|a 1049604434
|a 1175632795
|
020 |
|
|
|a 9781788397520
|
020 |
|
|
|a 1788397525
|
020 |
|
|
|z 1788392507
|
020 |
|
|
|z 9781788392501
|
020 |
|
|
|a 1788392507
|
020 |
|
|
|a 9781788392501
|
024 |
3 |
|
|a 9781788392501
|
035 |
|
|
|a (OCoLC)1044947541
|z (OCoLC)1044836206
|z (OCoLC)1045489067
|z (OCoLC)1046107040
|z (OCoLC)1046648040
|z (OCoLC)1049604434
|z (OCoLC)1175632795
|
037 |
|
|
|a B08104
|b 01201872
|
050 |
|
4 |
|a QA76.76.C68
|b .M666 2018
|
049 |
|
|
|a HCDD
|
100 |
1 |
|
|a K. A, Monnappa.
|
245 |
1 |
0 |
|a Learning Malware Analysis :
|b Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (500 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Malware Analysis; 1. What Is Malware?; 2. What Is Malware Analysis?; 3. Why Malware Analysis?; 4. Types Of Malware Analysis; 5. Setting Up The Lab Environment; 5.1 Lab Requirements; 5.2 Overview Of Lab Architecture; 5.3 Setting Up And Configuring Linux VM; 5.4 Setting Up And Configuring Windows VM; 6. Malware Sources; Summary; Chapter 2: Static Analysis; 1. Determining the File Type; 1.1 Identifying File Type Using Manual Method.
|
505 |
8 |
|
|a 1.2 Identifying File Type Using Tools1.3 Determining File Type Using Python; 2. Fingerprinting the Malware; 2.1 Generating Cryptographic Hash Using Tools; 2.2 Determining Cryptographic Hash in Python; 3. Multiple Anti-Virus Scanning; 3.1 Scanning the Suspect Binary with VirusTotal; 3.2 Querying Hash Values Using VirusTotal Public API; 4. Extracting Strings; 4.1 String Extraction Using Tools; 4.2 Decoding Obfuscated Strings Using FLOSS; 5. Determining File Obfuscation; 5.1 Packers and Cryptors; 5.2 Detecting File Obfuscation Using Exeinfo PE; 6. Inspecting PE Header Information.
|
505 |
8 |
|
|a 6.1 Inspecting File Dependencies and Imports6.2 Inspecting Exports; 6.3 Examining PE Section Table And Sections; 6.4 Examining the Compilation Timestamp; 6.5 Examining PE Resources; 7. Comparing And Classifying The Malware; 7.1 Classifying Malware Using Fuzzy Hashing; 7.2 Classifying Malware Using Import Hash; 7.3 Classifying Malware Using Section Hash; 7.4 Classifying Malware Using YARA; 7.4.1 Installing YARA; 7.4.2 YARA Rule Basics; 7.4.3 Running YARA; 7.4.4 Applications of YARA; Summary; Chapter 3: Dynamic Analysis; 1. Lab Environment Overview; 2. System And Network Monitoring.
|
505 |
8 |
|
|a 3. Dynamic Analysis (Monitoring) Tools3.1 Process Inspection with Process Hacker; 3.2 Determining System Interaction with Process Monitor; 3.3 Logging System Activities Using Noriben; 3.4 Capturing Network Traffic With Wireshark; 3.5 Simulating Services with INetSim; 4. Dynamic Analysis Steps; 5. Putting it All Together: Analyzing a Malware Executable; 5.1 Static Analysis of the Sample; 5.2 Dynamic Analysis of the Sample; 6. Dynamic-Link Library (DLL) Analysis; 6.1 Why Attackers Use DLLs; 6.2 Analyzing the DLL Using rundll32.exe; 6.2.1 Working of rundll32.exe.
|
505 |
8 |
|
|a 6.2.2 Launching the DLL Using rundll32.exeExample 1 -- Analyzing a DLL With No Exports; Example 2 -- Analyzing a DLL Containing Exports; Example 3 -- Analyzing a DLL Accepting Export Arguments; 6.3 Analyzing a DLL with Process Checks; Summary; Chapter 4: Assembly Language and Disassembly Primer; 1. Computer Basics; 1.1 Memory; 1.1.1 How Data Resides In Memory; 1.2 CPU; 1.2.1 Machine Language; 1.3 Program Basics; 1.3.1 Program Compilation; 1.3.2 Program On Disk; 1.3.3 Program In Memory; 1.3.4 Program Disassembly (From Machine code To Assembly code); 2. CPU Registers; 2.1 General-Purpose Registers.
|
500 |
|
|
|a 2.2 Instruction Pointer (EIP).
|
520 |
|
|
|a Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics.
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|
650 |
|
0 |
|a Malware.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer software
|x Evaluation.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer software
|x Evaluation
|2 fast
|
758 |
|
|
|i has work:
|a Learning malware analysis (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCH6qGc8q3GH4VTcF8ymRPP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a K A, Monnappa.
|t Learning Malware Analysis : Explore the Concepts, Tools, and Techniques to Analyze and Investigate Windows Malware.
|d Birmingham : Packt Publishing Ltd, ©2018
|z 9781788392501
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=5446050
|y Click for online access
|
903 |
|
|
|a EBC-AC
|
994 |
|
|
|a 92
|b HCD
|