Malware Analyst's Cookbook Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD is a collection of problems, solutions, and practical examples designed to enhance the analytical capabilities of anyone who works with malware. Whether you're tracking a Trojan across networks, performing an More...
Buy it from:
Rent it from:
List Price: $39.99
Publisher: John Wiley & Sons, Limited
Size: 7.50" wide x 9.50" long x 1.75" tall
Malware Analyst's Cookbook and DVD is a collection of problems, solutions, and practical examples designed to enhance the analytical capabilities of anyone who works with malware. Whether you're tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you achieve your goals more quickly and accurately. The book goes beyond how to tackle challenges using free or inexpensive tools. It also includes a generous amount of source code in C, Python, and Perl that show how to extend your favorite tools or build your own from scratch.Complete coverage of: Classifying Malware, Manipulation of PE files, Packing and Unpacking, Dynamic Malware Analysis, Analyzing Malicious Documents, Analyzing Shellcode, Analyzing Malicious URL's, Open Source Malware Research, Decoding and Decrypting, Analysis Tool Development, Attack Code, Working with DLLs, AntiRCE, AntiDebugging, AntiVM, Basics of Static analysis with IDA, Basics of Dynamic Analysis with Immunity/Olly, Physical memory forensics, Live/system forensics, Inter-process communication.The DVD will contain original, never-before-published custom programs from the authors to demonstrate concepts in the recipes. This tool set will include files required to complete reverse-engineering challenges and files required for the reader to follow along with exhibits/figures in the book.
Michael Hale Ligh is a malicious code analyst at Verisign iDefense and Chief of Special Projects at MNIN Security.Steven Adair is a member of the Shadowserver Foundation and frequently analyzes malware and tracks botnets. He also investigates cyber attacks of all kinds with an emphasis on those linked to cyber espionage.Blake Hartstein is the author of multiple security tools and a Rapid Response Engineer at Verisign iDefense, where he responds to malware incidents.Matthew Richard has authored numerous security tools and also ran a managed security service for banks and credit unions.